Sciweavers

14190 search results - page 2506 / 2838
» computing 2008
Sort
View
WWW
2008
ACM
16 years 5 months ago
A systematic approach for cell-phone worm containment
Cell phones are increasingly becoming attractive targets of various worms, which cause the leakage of user privacy, extra service charges and depletion of battery power. In this w...
Liang Xie, Hui Song, Trent Jaeger, Sencun Zhu
WWW
2008
ACM
16 years 5 months ago
Offline matching approximation algorithms in exchange markets
Motivated by several marketplace applications on rapidly growing online social networks, we study the problem of efficient offline matching algorithms for online exchange markets....
Zeinab Abbassi, Laks V. S. Lakshmanan
WWW
2008
ACM
16 years 5 months ago
Efficient similarity joins for near duplicate detection
With the increasing amount of data and the need to integrate data from multiple data sources, a challenging issue is to find near duplicate records efficiently. In this paper, we ...
Chuan Xiao, Wei Wang 0011, Xuemin Lin, Jeffrey Xu ...
WWW
2008
ACM
16 years 5 months ago
Understanding internet video sharing site workload: a view from data center design
In this paper we measured and analyzed the workload on Yahoo! Video, the 2nd largest U.S. video sharing site, to understand its nature and the impact on online video data center d...
Xiaozhu Kang, Hui Zhang 0002, Guofei Jiang, Haifen...
KDD
2008
ACM
243views Data Mining» more  KDD 2008»
16 years 4 months ago
Permu-pattern: discovery of mutable permutation patterns with proximity constraint
Pattern discovery in sequences is an important problem in many applications, especially in computational biology and text mining. However, due to the noisy nature of data, the tra...
Meng Hu, Jiong Yang, Wei Su
« Prev « First page 2506 / 2838 Last » Next »