Sciweavers

2995 search results - page 140 / 599
» On multi-avoidance of generalized patterns
Sort
View
FASE
2009
Springer
14 years 3 months ago
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...
Frank Hermann, Hartmut Ehrig, Claudia Ermel
ICDAR
2009
IEEE
14 years 3 months ago
Scalable Feature Extraction from Noisy Documents
We cope with the metadata recognition in layoutoriented documents. We address the problem as a classification task and propose a method for automatic extraction of relevant featu...
Loïc Lecerf, Boris Chidlovskii
CIKM
2009
Springer
14 years 3 months ago
Using domain ontology for semantic web usage mining and next page prediction
This paper proposes the integration of semantic information drawn from a web application’s domain knowledge into all phases of the web usage mining process (preprocessing, patte...
Nizar R. Mabroukeh, Christie I. Ezeife
AH
2008
Springer
14 years 3 months ago
Social Information Access for the Rest of Us: An Exploration of Social YouTube
The motivation behind many Information Retrieval systems is to identify and present relevant information to people given their current goals and needs. Learning about user preferen...
Maurice Coyle, Jill Freyne, Peter Brusilovsky, Bar...
ICDE
2007
IEEE
179views Database» more  ICDE 2007»
14 years 3 months ago
A New ILP-based Concept Discovery Method for Business Intelligence
In this work, we propose a multi-relational concept discovery method for business intelligence applications. Multi-relational data mining finds interesting patterns that span ove...
Seda Daglar Toprak, Pinar Senkul, Yusuf Kavurucu, ...