Sciweavers

1834 search results - page 319 / 367
» Public Key Cryptography
Sort
View
FIMI
2004
161views Data Mining» more  FIMI 2004»
13 years 9 months ago
ABS: Adaptive Borders Search of frequent itemsets
In this paper, we present an ongoing work to discover maximal frequent itemsets in a transactional database. We propose an algorithm called ABS for Adaptive Borders Search, which ...
Frédéric Flouvat, Fabien De Marchi, ...
ECIR
2006
Springer
13 years 9 months ago
Intrinsic Plagiarism Detection
Current research in the field of automatic plagiarism detection for text documents focuses on algorithms that compare plagiarized documents against potential original documents. Th...
Sven Meyer zu Eissen, Benno Stein
IAAI
2001
13 years 9 months ago
CARMA: A Case-Based Range Management Advisor
: CARMA is an advisory system for rangeland grasshopper infestations that demonstrates how AI technology can deliver expert advice to compensate for cutbacks in public services. CA...
Karl Branting, John D. Hastings, Jeffrey A. Lockwo...
ECIS
2003
13 years 9 months ago
A qualitative approach to investigating the behavioural definitions of the four-paradigm theory of information systems developme
Hirschheim, Klein and Lyytinen introduced the four-paradigm theory of information systems development (ISD) as a significant attempt to systematise developer assumptions. The theo...
Donal J. Flynn, Zahid I. Hussain
ECSCW
2003
13 years 9 months ago
Applying Cyber-Archaeology
Online spaces that enable public shared inter-personal communications are of significant social and economic importance. This paper outlines a theoretical model and methodology, la...
Quentin Jones