Sciweavers

5924 search results - page 1120 / 1185
» Normal Process Representatives
Sort
View
PKDD
2005
Springer
129views Data Mining» more  PKDD 2005»
14 years 1 months ago
Interestingness is Not a Dichotomy: Introducing Softness in Constrained Pattern Mining
Abstract. The paradigm of pattern discovery based on constraints was introduced with the aim of providing to the user a tool to drive the discovery process towards potentially inte...
Stefano Bistarelli, Francesco Bonchi
TLCA
2005
Springer
14 years 1 months ago
Privacy in Data Mining Using Formal Methods
There is growing public concern about personal data collected by both private and public sectors. People have very little control over what kinds of data are stored and how such da...
Stan Matwin, Amy P. Felty, István T. Hern&a...
WINE
2005
Springer
179views Economy» more  WINE 2005»
14 years 1 months ago
A Graph-Theoretic Network Security Game
Consider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. Such limitations result from economy cos...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
ICADL
2005
Springer
137views Education» more  ICADL 2005»
14 years 1 months ago
A Collaborative Filtering Based Re-ranking Strategy for Search in Digital Libraries
Users of a digital book library system typically interact with the system to search for books by querying on the metadata describing the books or to search for information in the p...
U. Rohini, Vamshi Ambati
APGV
2004
ACM
145views Visualization» more  APGV 2004»
14 years 1 months ago
Conveying three-dimensional shape with texture
Studies have shown that although shading can give an image a ”natural” look and is an important shape cue, visual perception of surface shape from shading only is severely lim...
Sunghee Kim, Haleh Hagh-Shenas, Victoria Interrant...
« Prev « First page 1120 / 1185 Last » Next »