Sciweavers

1303 search results - page 229 / 261
» Cyclic Association Rules
Sort
View
JCS
2008
93views more  JCS 2008»
15 years 4 months ago
On the Bayes risk in information-hiding protocols
Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be reg...
Konstantinos Chatzikokolakis, Catuscia Palamidessi...
JSS
2006
99views more  JSS 2006»
15 years 4 months ago
Automatic generation of assumptions for modular verification of software specifications
Model checking is a powerful automated technique mainly used for the verification of properties of reactive systems. In practice, model checkers are limited due to the state explos...
Claudio de la Riva, Javier Tuya
KAIS
2006
164views more  KAIS 2006»
15 years 4 months ago
On efficiently summarizing categorical databases
Frequent itemset mining was initially proposed and has been studied extensively in the context of association rule mining. In recent years, several studies have also extended its a...
Jianyong Wang, George Karypis
161
Voted
ESWA
2007
178views more  ESWA 2007»
15 years 4 months ago
Educational data mining: A survey from 1995 to 2005
ct 7 Currently there is an increasing interest in data mining and educational systems, making educational data mining as a new growing 8 research community. This paper surveys the ...
Cristóbal Romero, Sebastián Ventura
ACTA
2005
87views more  ACTA 2005»
15 years 4 months ago
Hybrid networks of evolutionary processors are computationally complete
A hybrid network of evolutionary processors (an HNEP) consists of several language processors which are located in the nodes of a virtual graph and able to perform only one type o...
Erzsébet Csuhaj-Varjú, Carlos Mart&i...