Sciweavers

4207 search results - page 689 / 842
» Stable Analysis Patterns
Sort
View
ICWE
2009
Springer
14 years 2 months ago
Trust and Reputation Mining in Professional Virtual Communities
Abstract. Communication technologies, such as e-mail, instant messaging, discussion forums, blogs, and newsgroups connect people together, forming virtual communities. This concept...
Florian Skopik, Hong Linh Truong, Schahram Dustdar
IFIP
2009
Springer
14 years 2 months ago
Contextual Inquiry in Signal Boxes of a Railway Organization
A number of selected field-study techniques have been validated in a case study in the domain of railway signal boxes. The context of this work is the endeavour of a human-centred ...
Joke Van Kerckhoven, Sabine Geldof, Bart Vermeersc...
MM
2009
ACM
125views Multimedia» more  MM 2009»
14 years 2 months ago
Unfolding speaker clustering potential: a biomimetic approach
Speaker clustering is the task of grouping a set of speech utterances into speaker-specific classes. The basic techniques for solving this task are similar to those used for spea...
Thilo Stadelmann, Bernd Freisleben
DSN
2008
IEEE
14 years 2 months ago
TCP covert timing channels: Design and detection
Exploiting packets’ timing information for covert communication in the Internet has been explored by several network timing channels and watermarking schemes. Several of them em...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
EMS
2008
IEEE
14 years 2 months ago
A Weighted Utility Framework for Mining Association Rules
Association rule mining (ARM) identifies frequent itemsets from databases and generates association rules by assuming that all items have the same significance and frequency of oc...
M. Sulaiman Khan, Maybin K. Muyeba, Frans Coenen