We propose a method of classifying XML documents and extracting XML schema from XML by inductive inference based on constraint logic programming. The goal of this work is to type ...
Recent proposals to apply data mining systems to problems in law enforcement, national security, and fraud detection have attracted both media attention and technical critiques of...
Wireless sensor networks typically consist of a large number of sensor nodes embedded in a physical space. Such sensors are low-power devices that are primarily used for monitoring...
Abstract-- Affective information is vital for effective human-tohuman communication. Likewise, human-to-computer communication could be potentiated by an "affective barometer&...
Abdul Rehman Abbasi, Matthew N. Dailey, Nitin V. A...
This paper proposes an approach to classification of adjacent segments of a time series as being either of classes. We use a hierarchical model that consists of a feature extract...