Showing 721–732 of 776 results

  • TopicSketch: Real-time Bursty Topic Detection from Twitter

    0 out of 5
    5,500

    TopicSketch: Real-time Bursty Topic Detection from Twitter Abstract-Twitter has become one of the largest microblogging platforms for users around the world to share anything happening around them with friends and beyond. A bursty topic in Twitter is one that triggers a surge of relevant tweets within a short period of time, which often reflects important…

  • Toward Energy-Efficient Cloud Computing Prediction, Consolidation and Over Commitment

    0 out of 5
    4,500

    Toward Energy-Efficient Cloud Computing Prediction, Consolidation and Over Commitment Abstract? : Toward Energy-Efficient Cloud Computing Prediction, Consolidation < Final Year Projects 2016 >amalgamation and Over Commitment. Energy consumption is the consumption of energy or power. Cloud Computing is a developing technology which is revolutionizing the IT Infrastructure due to its high scalability and flexibility in…

  • Toward Optimal Feature Selection in Naive Bayes for Text Categorization

    0 out of 5

    Toward Optimal Feature Selection in Naive Bayes for Text Categorization Abstract?Automated feature selection is important for text categorization to reduce the feature size and to speed up the learning process of classifiers. In this paper, we present a novel and efficient feature selection framework based on the Information Theory, which aims to rank the features…

  • Placeholder

    Toward SWSs Discovery: Mapping fromWSDL to OWL-S Based on OntologySearch and Standardization Engine

    0 out of 5
    4,500

    Toward SWSs Discovery: Mapping fromWSDL to OWL-S Based on OntologySearch and Standardization Engine Abstract? Semantic Web Services (SWSs) represent the most recent and revolutionary technology developed for machine-to-machine interaction on the web 3.0. As for the conventional web services, the problem of discovering and selecting the most suitable web service represents a challenge for SWSs…

  • Towards Detecting Compromised Accounts on Social Networks

    0 out of 5
    3,500

    Towards Detecting Compromised Accounts on Social Networks Abstract? Towards Detecting Compromised Accounts on Social Networks. Compromising social network accounts has become a pro?table course of action for cybercriminals. By hijacking control of a popular media or business account, attackers can distribute their malicious messages or disseminate fake information to a large user base. The impacts…

  • Towards Effective Bug Triage with Software Data Reduction Techniques

    0 out of 5
    4,500

    Towards E ective Bug Triage with Software Data Reduction Techniques Abstract? Towards Effective Bug Triage with Software Data Reduction Techniques. Software companies spend over 45 percent of cost in dealing with software bugs. An inevitable step of fixing bugs is bug triage, which aims to correctly assign a developer to a new bug. To decrease…

  • Towards Effective Bug Triage with Software Data Reduction Techniques

    0 out of 5
    4,500

    Towards Effective Bug Triage with Software Data Reduction Techniques Abstract? Towards Effective Bug Triage with Software Data Reduction Techniques. Software companies spend over 45 percent of cost in dealing with software bugs. An inevitable step of fixing bugs is bug triage, which aims to correctly assign a developer to a new bug. To decrease the…

  • Towards Online Shortest Path

    0 out of 5
    4,500

    Towards Online Shortest Path Abstract?Towards Online Shortest Path, The online shortest path problem aims at computing the shortest path based on live traffic circumstances. This is very important in modern car navigation systems as it helps drivers to make sensible decisions. To our best knowledge, there is no efficient system/solution that can offer affordable costs…

  • Towards Online Shortest Path Computation

    0 out of 5
    4,500

    Towards Online Shortest Path Computation Abstract?Towards Online Shortest Path Computation. The online shortest path problem aims at computing the shortest path based on live traffic circumstances. This is very important in modern car navigation systems as it helps drivers to make sensible decisions. To our best knowledge, there is no efficient system/solution that can offer…

  • Towards Open-World Person Re-Identification by One-Shot Group-based Verification

    0 out of 5
    4,500

    Towards Open-World Person Re-Identification by One-Shot Group-based Verification Abstract? Towards Open-World Person Re-Identification by One-Shot Group-based Verification. Solving the problem of matching people across non-overlapping multi-camera views, known as person re-identification (re-id), has received increasing interests in computer vision. In a real-world application scenario, a watch-list < gallery set > of a handful of known…

  • Towards Privacy Preserving Publishing of Set-valued Data on Hybrid Cloud

    0 out of 5
    4,500

    Towards Privacy Preserving Publishing of Set-valued Data on Hybrid Cloud Abstract? Towards Privacy Preserving Publishing of Set-valued Data on Hybrid Cloud. Storage as a service has become an important paradigm in cloud computing for its great flexibility and economic savings. However, the development is hampered by data privacy concerns: data owners no longer physically possess…

  • Traffic Engineering in Software Defined Networks

    0 out of 5
    4,500

    Traffic Engineering in Software Defined Networks Abstract?Software Defined Networking is a new networking paradigm that separates the network control plane from the packet forwarding plane and provides applications with an abstracted centralized view of the distributed network state. A logically centralized controller that has a global network view is responsible for all the control decisions…

End of content

End of content