Sciweavers

2446 search results - page 67 / 490
» Polyadic Concept Analysis
Sort
View
ATAL
2004
Springer
14 years 2 months ago
A Trust Analysis Methodology for Pervasive Computing Systems
Abstract. We present an analysis Trust Analysis Methodology for finding trust issues within pervasive computing systems. It is based on a systematic analysis of scenarios that des...
Stéphane Lo Presti, Michael J. Butler, Mich...
DOCENG
2011
ACM
12 years 8 months ago
An exploratory analysis of mind maps
The results presented in this paper come from an exploratory study of 19,379 mind maps created by 11,179 users from the mind mapping applications ‘Docear’ and ‘MindMeister...
Jöran Beel, Stefan Langer
ICDE
2012
IEEE
285views Database» more  ICDE 2012»
11 years 11 months ago
Multidimensional Analysis of Atypical Events in Cyber-Physical Data
— A Cyber-Physical System (CPS) integrates physical devices (e.g., sensors, cameras) with cyber (or informational) components to form a situation-integrated analytical system tha...
Lu An Tang, Xiao Yu, Sangkyum Kim, Jiawei Han, Wen...
PODS
2012
ACM
240views Database» more  PODS 2012»
11 years 11 months ago
Approximate computation and implicit regularization for very large-scale data analysis
Database theory and database practice are typically the domain of computer scientists who adopt what may be termed an algorithmic perspective on their data. This perspective is ve...
Michael W. Mahoney
CEC
2011
IEEE
12 years 8 months ago
Cost-benefit analysis of using heuristics in ACGP
—Constrained Genetic Programming (CGP) is a method of searching the Genetic Programming search space non-uniformly, giving preferences to certain subspaces according to some heur...
John W. Aleshunas, Cezary Z. Janikow