Sciweavers

953 search results - page 84 / 191
» Using Clustering and Blade Clusters in the Terabyte Task
Sort
View
TRECVID
2007
14 years 11 months ago
Summarizing BBC Rushes the Informedia Way
For the first time in 2007, TRECVID considered structured evaluation of automated video summarization, utilizing BBC rushes video. This paper discusses in detail our approaches fo...
Alexander G. Hauptmann, Michael G. Christel, Wei-H...
WWW
2011
ACM
14 years 4 months ago
Counting triangles and the curse of the last reducer
The clustering coefficient of a node in a social network is a fundamental measure that quantifies how tightly-knit the community is around the node. Its computation can be reduce...
Siddharth Suri, Sergei Vassilvitskii
CLUSTER
2007
IEEE
15 years 4 months ago
Scalable, fault-tolerant management of Grid Services
— The service-oriented architecture has come a long way in solving the problem of reusability of existing software resources. Grid applications today are composed of a large numb...
Harshawardhan Gadgil, Geoffrey Fox, Shrideep Palli...
ICONIP
2004
14 years 11 months ago
Semi-supervised Kernel-Based Fuzzy C-Means
This paper presents a semi-supervised kernel-based fuzzy c-means algorithm called S2KFCM by introducing semi-supervised learning technique and the kernel method simultaneously into...
Daoqiang Zhang, Keren Tan, Songcan Chen
IJNSEC
2011
232views more  IJNSEC 2011»
14 years 4 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou