Sciweavers

213 search results - page 24 / 43
» Monotonicity in Rule Based Update
Sort
View
PKDD
2007
Springer
120views Data Mining» more  PKDD 2007»
14 years 1 months ago
Privacy Preserving Market Basket Data Analysis
Randomized Response techniques have been empirically investigated in privacy preserving association rule mining. However, previous research on privacy preserving market basket data...
Ling Guo, Songtao Guo, Xintao Wu
JACM
2007
84views more  JACM 2007»
13 years 7 months ago
Polymorphic higher-order recursive path orderings
This paper extends the termination proof techniques based on reduction orderings to a higher-order setting, by defining a family of recursive path orderings for terms of a typed ...
Jean-Pierre Jouannaud, Albert Rubio
INFOCOM
2009
IEEE
14 years 2 months ago
Scalar Prefix Search: A New Route Lookup Algorithm for Next Generation Internet
Currently, the increasing rate of routing lookups in Internet routers, the large number of prefixes and also the transition from IPV4 to IPV6, have caused Internet designers to pro...
Mohammad Behdadfar, Hossein Saidi, Hamid Alaei, Ba...
COLING
2010
13 years 2 months ago
Tibetan Number Identification Based on Classification of Number Components in Tibetan Word Segmentation
Tibetan word segmentation is essential for Tibetan information processing. People mainly use the basic machine matching method which is based on dictionary to segment Tibetan word...
Huidan Liu, Weina Zhao, Minghua Nuo, Li Jiang, Jia...
CORR
2010
Springer
158views Education» more  CORR 2010»
13 years 7 months ago
Dynamic Multi Layer Signature based Intrusion Detection system Using Mobile Agents
Intrusion detection systems have become a key component in ensuring the safety of systems and networks. As networks grow in size and speed continues to increase, it is crucial tha...
Mueen Uddin, Azizah Abdul Rahman