Sciweavers

1805 search results - page 275 / 361
» A Theory of Closure Operators
Sort
View
IMC
2004
ACM
15 years 10 months ago
Single-hop probing asymptotics in available bandwidth estimation: sample-path analysis
In this paper, we take the sample-path approach in analyzing the asymptotic behavior of single-hop bandwidth estimation under bursty cross-traffic and show that these results are ...
Xiliang Liu, Kaliappa Nadar Ravindran, Benyuan Liu...
CASDMKM
2004
Springer
144views Data Mining» more  CASDMKM 2004»
15 years 9 months ago
Knowledge-Information Circulation Through the Enterprise: Forward to the Roots of Knowledge Management
The field of Knowledge Management (KM) has already completed its initiatory phase, characterized by operational confusion between knowledge and information, stemming from the tenuo...
Milan Zeleny
ECAI
2004
Springer
15 years 9 months ago
A Backtracking Strategy for Order-Independent Incremental Learning
Agents that exist in an environment that changes over time, and are able to take into account the temporal nature of experience, are commonly called incremental learners. It is wid...
Nicola Di Mauro, Floriana Esposito, Stefano Ferill...
IFM
2004
Springer
15 years 9 months ago
Verifying Controlled Components
Recent work on combining CSP and B has provided ways of describing systems comprised of components described in both B (to express requirements on state) and CSP (to express intera...
Steve Schneider, Helen Treharne
KDD
2004
ACM
159views Data Mining» more  KDD 2004»
15 years 9 months ago
Optimal randomization for privacy preserving data mining
Randomization is an economical and efficient approach for privacy preserving data mining (PPDM). In order to guarantee the performance of data mining and the protection of individ...
Michael Yu Zhu, Lei Liu