Sciweavers

1512 search results - page 153 / 303
» When Suboptimal Rules
Sort
View
WWW
2007
ACM
15 years 12 months ago
Mirror site maintenance based on evolution associations of web directories
Mirroring Web sites is a well-known technique commonly used in the Web community. A mirror site should be updated frequently to ensure that it reflects the content of the original...
Ling Chen 0002, Sourav S. Bhowmick, Wolfgang Nejdl
KDD
2001
ACM
124views Data Mining» more  KDD 2001»
15 years 11 months ago
Tri-plots: scalable tools for multidimensional data mining
We focus on the problem of finding patterns across two large, multidimensional datasets. For example, given feature vectors of healthy and of non-healthy patients, we want to answ...
Agma J. M. Traina, Caetano Traina Jr., Spiros Papa...
PERCOM
2005
ACM
15 years 11 months ago
Exploiting Information Relationships for Access Control
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Urs Hengartner, Peter Steenkiste
ICASSP
2008
IEEE
15 years 5 months ago
Phonetic pronunciations for arabic speech-to-text systems
In this paper two aspects of generating and using phonetic Arabic dictionaries are described. First, the use of single pronunciation acoustic models in the context of Arabic large...
Frank Diehl, Mark J. F. Gales, Marcus Tomalin, Phi...
NOMS
2008
IEEE
132views Communications» more  NOMS 2008»
15 years 5 months ago
DYSWIS: An architecture for automated diagnosis of networks
As the complexity of networked systems increases, we need mechanisms to automatically detect failures in the network and diagnose the cause of such failures. To realize true self-...
Vishal Kumar Singh, Henning Schulzrinne, Kai Miao