Sciweavers

1856 search results - page 287 / 372
» cluster 2008
Sort
View
128
Voted
JCP
2008
120views more  JCP 2008»
15 years 18 days ago
Multimedia Resource Replication Strategy for a Pervasive Peer-to-Peer Environment
The computer world is experiencing a paradigm shift towards context-aware pervasive computing, where diverse computer devices communicate with each other through different network ...
Letian Rong
JCP
2008
206views more  JCP 2008»
15 years 18 days ago
SW-R2P: A Trusted Small World Overlay P2P Network with Zero Knowledge Identification
In order to implement both the efficiency and security in the Peer-to-Peer (P2P) network, we design a trusted small world overlay P2P network with the role based and reputation bas...
Yingjie Xia, Guanghua Song, Yao Zheng
96
Voted
JNW
2008
97views more  JNW 2008»
15 years 18 days ago
Vehicle Identification using Discrete Spectrums in Wireless Sensor Networks
We studied the possibility of using wireless sensor networks for vehicle identification in a large open field. This is exciting research in that it not only presents a challenge bu...
Seung S. Yang, Yoon G. Kim, Hongsik Choi
107
Voted
DKE
2007
132views more  DKE 2007»
15 years 18 days ago
Automated ontology construction for unstructured text documents
Ontology is playing an increasingly important role in knowledge management and the Semantic Web. This study presents a novel episode-based ontology construction mechanism to extra...
Chang-Shing Lee, Yuan-Fang Kao, Yau-Hwang Kuo, Mei...
103
Voted
KAIS
2008
79views more  KAIS 2008»
15 years 18 days ago
Top 10 algorithms in data mining
This paper presents the top 10 data mining algorithms identified by the IEEE International Conference on Data Mining (ICDM) in December 2006: C4.5, k-Means, SVM, Apriori, EM, Page...
Xindong Wu, Vipin Kumar, J. Ross Quinlan, Joydeep ...