Sciweavers

1466 search results - page 209 / 294
» Completeness of the Authentication Tests
Sort
View
CINQ
2004
Springer
125views Database» more  CINQ 2004»
14 years 1 months ago
Deducing Bounds on the Support of Itemsets
Mining Frequent Itemsets is the core operation of many data mining algorithms. This operation however, is very data intensive and sometimes produces a prohibitively large output. I...
Toon Calders
NIME
2004
Springer
89views Music» more  NIME 2004»
14 years 1 months ago
Measurement of Latency in Interactive Multimedia Art
In this paper, I would like to introduce my experimental study of multimedia psychology. My initial focus of investigation is the interaction between perceptions of auditory and v...
Yoichi Nagashima
PPSN
2004
Springer
14 years 1 months ago
Credit Assignment Among Neurons in Co-evolving Populations
Different credit assignment strategies are investigated in a two level co-evolutionary model which involves a population of Gaussian neurons and a population of radial basis funct...
Vineet R. Khare, Xin Yao, Bernhard Sendhoff
VLDB
2004
ACM
124views Database» more  VLDB 2004»
14 years 1 months ago
Data Sharing Through Query Translation in Autonomous Sources
We consider the problem of data sharing between autonomous data sources in an environment where constraints cannot be placed on the shared contents of sources. Our solutions rely ...
Anastasios Kementsietsidis, Marcelo Arenas
WG
2004
Springer
14 years 1 months ago
Recognizing HHD-free and Welsh-Powell Opposition Graphs
In this paper, we consider the recognition problem on two classes of perfectly orderable graphs, namely, the HHD-free and the Welsh-Powell opposition graphs (or WPO-graphs). In par...
Stavros D. Nikolopoulos, Leonidas Palios