Sciweavers

471 search results - page 27 / 95
» Social applications: exploring a more secure framework
Sort
View
PAKDD
1999
ACM
129views Data Mining» more  PAKDD 1999»
14 years 16 hour ago
Visually Aided Exploration of Interesting Association Rules
Association rules are a class of important regularities in databases. They are found to be very useful in practical applications. However, the number of association rules discovere...
Bing Liu, Wynne Hsu, Ke Wang, Shu Chen
ICALT
2005
IEEE
14 years 1 months ago
Intelligent Learning Environment: Building Hybrid System from Standard Application and Web Application
In this paper, we explore the idea of Intelligent Learning Environment (ILE) by building a system for teaching and learning music in a web-based environment. Our system is a frame...
Keh-Siong Chee, Somnuk Phon-Amnuaisuk
ESIAT
2009
IEEE
13 years 5 months ago
A Novel Application of Variable Fuzzy Set on Alarming of Coalmine Gas
Coalmine gas disaster is one of the severe natural disasters that restrict the safety production of coalmines. Timely monitoring and alarming of coalmine gas is an important part o...
Jinhui Zhao, Mingliang Li, Xu Qian, Lijuan Jia
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
13 years 11 months ago
Object Capabilities and Isolation of Untrusted Web Applications
—A growing number of current web sites combine active content (applications) from untrusted sources, as in so-called mashups. The object-capability model provides an appealing ap...
Sergio Maffeis, John C. Mitchell, Ankur Taly
ICRA
2009
IEEE
115views Robotics» more  ICRA 2009»
14 years 2 months ago
Multi-robot coordination using generalized social potential fields
Abstract— We present a novel approach to compute collisionfree paths for multiple robots subject to local coordination constraints. More specifically, given a set of robots, the...
Russell Gayle, William Moss, Ming C. Lin, Dinesh M...