Sciweavers

2913 search results - page 256 / 583
» How Much to Copy
Sort
View
PAKDD
2005
ACM
100views Data Mining» more  PAKDD 2005»
15 years 9 months ago
Pushing Tougher Constraints in Frequent Pattern Mining
In this paper we extend the state-of-art of the constraints that can be pushed in a frequent pattern computation. We introduce a new class of tough constraints, namely Loose Anti-m...
Francesco Bonchi, Claudio Lucchese
RISE
2005
Springer
15 years 9 months ago
Rapid System Development Via Product Line Architecture Implementation
Software Product Line (SPL) engineering allows designers to reason about an entire family of software applications, instead of a single product, with a strategic importance for the...
Mauro Caporuscio, Henry Muccini, Patrizio Pellicci...
SEMWEB
2005
Springer
15 years 9 months ago
Representing Web Service Policies in OWL-DL
Abstract. Recently, there have been a number of proposals for languages for expressing web service constraints and capabilities, with WSPolicy and WSPL leading the way. The propose...
Vladimir Kolovski, Bijan Parsia, Yarden Katz, Jame...
W2GIS
2005
Springer
15 years 9 months ago
Resource Discovery Using Spatio-temporal Information in Mobile Ad-Hoc Networks
In this paper we examine the benefit of reports about resources in mobile ad-hoc networks. Each disseminated report represents information about a spatio-temporal event, such as th...
Ouri Wolfson, Bo Xu, Huabei Yin, Naphtali Rishe
WCC
2005
Springer
172views Cryptology» more  WCC 2005»
15 years 9 months ago
Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems
Abstract. The Matsumoto-Imai (MI) cryptosystem was the first multivariate public key cryptosystem proposed for practical use. Though MI is now considered insecure due to Patarinā€...
Adama Diene, Jintai Ding, Jason E. Gower, Timothy ...