Sciweavers

4052 search results - page 81 / 811
» Using RDF to describe networks
Sort
View
79
Voted
ECIR
2010
Springer
14 years 10 months ago
Enriching Peer-to-Peer File Descriptors Using Association Rules on Query Logs
We describe a P2P association rule mining descriptor enrichment approach that statistically significantly increases accuracy by greater than 15% over the non-enriched baseline. Unl...
Nazli Goharian, Ophir Frieder, Wai Gen Yee, Jay Mu...
84
Voted
CHI
2008
ACM
16 years 1 months ago
Use and reuse of shared lists as a social content type
Social networking sites support a variety of shared content types such as photos, videos, or music. More structured or form-based social content types are not mainstream but we ha...
Werner Geyer, Casey Dugan, Joan Morris DiMicco, Da...
115
Voted
AIME
2007
Springer
15 years 4 months ago
Using Temporal Context-Specific Independence Information in the Exploratory Analysis of Disease Processes
Abstract. Disease processes in patients are temporal in nature and involve uncertainty. It is necessary to gain insight into these processes when aiming at improving the diagnosis,...
Stefan Visscher, Peter J. F. Lucas, Ildikó ...
89
Voted
ONDM
2007
15 years 2 months ago
80Gb/s Multi-wavelength Optical Packet Switching Using PLZT Switch
This paper proposes 80Gb/s multi-wavelength optical packet switching(OPS) using a PLZT switch. The Multi-wavelength OPS Network can achieve low implementation costs compared to exi...
Katsuya Watabe, Tetsuya Saito, Nobutaka Matsumoto,...
DSN
2006
IEEE
15 years 4 months ago
Using Attack Injection to Discover New Vulnerabilities
Due to our increasing reliance on computer systems, security incidents and their causes are important problems that need to be addressed. To contribute to this objective, the pape...
Nuno Ferreira Neves, João Antunes, Miguel C...