Sciweavers

13895 search results - page 2667 / 2779
» Exploration
Sort
View
KAIS
2008
114views more  KAIS 2008»
13 years 8 months ago
A new concise representation of frequent itemsets using generators and a positive border
A complete set of frequent itemsets can get undesirably large due to redundancy when the minimum support threshold is low or when the database is dense. Several concise representat...
Guimei Liu, Jinyan Li, Limsoon Wong
ECCC
2007
127views more  ECCC 2007»
13 years 8 months ago
Universal Semantic Communication I
Is it possible for two intelligent beings to communicate meaningfully, without any common language or background? This question has interest on its own, but is especially relevant...
Brendan Juba, Madhu Sudan
ECRA
2007
141views more  ECRA 2007»
13 years 8 months ago
A growth theory perspective on B2C e-commerce growth in Europe: An exploratory study
Information and communication technologies (ICTs) continue to have a profound effect on the economies and societies where they are used. In this article, we propose three related...
Shuchun Ho, Robert J. Kauffman, Ting-Peng Liang
JMIV
2006
91views more  JMIV 2006»
13 years 8 months ago
Harmonic Embeddings for Linear Shape Analysis
We present a novel representation of shape for closed contours in R2 or for compact surfaces in R3 explicitly designed to possess a linear structure. This greatly simplifies linear...
Alessandro Duci, Anthony J. Yezzi, Stefano Soatto,...
JMLR
2006
113views more  JMLR 2006»
13 years 8 months ago
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses t...
Charles V. Wright, Fabian Monrose, Gerald M. Masso...
« Prev « First page 2667 / 2779 Last » Next »