Sciweavers

7581 search results - page 1333 / 1517
» Incompleteness in Data Mining
Sort
View
SSD
2007
Springer
133views Database» more  SSD 2007»
15 years 10 months ago
Compression of Digital Road Networks
Abstract. In the consumer market, there has been an increasing interest in portable navigation systems in the last few years. These systems usually work on digital map databases st...
Jonghyun Suh, Sungwon Jung, Martin Pfeifle, Khoa T...
DASC
2006
IEEE
15 years 10 months ago
Assessing Vulnerabilities in Apache and IIS HTTP Servers
We examine the feasibility of quantitatively characterizing the vulnerabilities in the two major HTTP servers. In particular, we investigate the applicability of quantitative empi...
Sung-Whan Woo, Omar H. Alhazmi, Yashwant K. Malaiy...
ADC
2006
Springer
188views Database» more  ADC 2006»
15 years 10 months ago
Discovering task-oriented usage pattern for web recommendation
Web transaction data usually convey user task-oriented behaviour pattern. Web usage mining technique is able to capture such informative knowledge about user task pattern from usa...
Guandong Xu, Yanchun Zhang, Xiaofang Zhou
JCDL
2006
ACM
133views Education» more  JCDL 2006»
15 years 10 months ago
Repository software evaluation using the audit checklist for certification of trusted digital repositories
The NDIIPP ECHO DEPository project [1] digital repository evaluation will use an augmented version of the draft Audit Checklist for Certification of Trusted Digital Repositories (...
Joanne Kaczmarek, Thomas G. Habing, Janet Eke
OTM
2005
Springer
15 years 9 months ago
OWL-Based User Preference and Behavior Routine Ontology for Ubiquitous System
In ubiquitous computing, behavior routine learning is the process of mining the context-aware data to find interesting rules on the user’s behavior, while preference learning tri...
Kim Anh Pham Ngoc, Young-Koo Lee, Sungyoung Lee
« Prev « First page 1333 / 1517 Last » Next »