Sciweavers

1018 search results - page 104 / 204
» Generative unbinding of names
Sort
View
AUSDM
2007
Springer
112views Data Mining» more  AUSDM 2007»
14 years 3 months ago
Measuring Data-Driven Ontology Changes using Text Mining
Most current ontology management systems concentrate on detecting usage-driven changes and representing changes formally in order to maintain the consistency. In this paper, we pr...
Majigsuren Enkhsaikhan, Wilson Wong, Wei Liu, Mark...
FC
2007
Springer
106views Cryptology» more  FC 2007»
14 years 3 months ago
Dynamic Virtual Credit Card Numbers
Theft of stored credit card information is an increasing threat to e-commerce. We propose a dynamic virtual credit card number scheme that reduces the damage caused by stolen credi...
Ian Molloy, Jiangtao Li, Ninghui Li
MDM
2007
Springer
106views Communications» more  MDM 2007»
14 years 3 months ago
Protecting Moving Trajectories with Dummies
Abstract—Dummy-based anonymization techniques for protecting location privacy of mobile users have been proposed in the literature. By generating dummies that move in humanlike t...
Tun-Hao You, Wen-Chih Peng, Wang-Chien Lee
EUROCAST
2005
Springer
133views Hardware» more  EUROCAST 2005»
14 years 2 months ago
An Iterative Method for Mining Frequent Temporal Patterns
The incorporation of temporal semantic into the traditional data mining techniques has caused the creation of a new area called Temporal Data Mining. This incorporation is especial...
Francisco Guil, Antonio B. Bailón, Alfonso ...
SCAM
2003
IEEE
14 years 2 months ago
Unique Renaming of Java Using Source Transformation
This paper presents a flexible way in which a deisgn model extracted from Java programs can remain unified with the source code. Each entity declaration and reference in the Java ...
Xinping Guo, James R. Cordy, Thomas R. Dean