Sciweavers

432 search results - page 58 / 87
» Telling Our Stories
Sort
View
ASIACRYPT
2004
Springer
14 years 3 months ago
Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes
An untraceable fair network payment protocol is proposed by Wang in Asiacrypt’03, which employs the existent techniques of the offline untraceable cash and a new technique calle...
Feng Bao
PAKDD
2010
ACM
152views Data Mining» more  PAKDD 2010»
14 years 3 months ago
Mining Association Rules in Long Sequences
Abstract. Discovering interesting patterns in long sequences, and finding confident association rules within them, is a popular area in data mining. Most existing methods define...
Boris Cule, Bart Goethals
SIGIR
2010
ACM
14 years 2 months ago
Understanding web browsing behaviors through Weibull analysis of dwell time
Dwell time on Web pages has been extensively used for various information retrieval tasks. However, some basic yet important questions have not been sufficiently addressed, e.g., ...
Chao Liu, Ryen W. White, Susan T. Dumais
ICCBR
1995
Springer
14 years 1 months ago
On the use of CBR in optimisation problems such as the TSP
The particular strength of CBR is normally considered to be its use in weak theory domains where solution quality is compiled into cases and is reusable. In this paper we explore a...
Padraig Cunningham, Barry Smyth, Neil J. Hurley
ASUNAM
2010
IEEE
13 years 11 months ago
Leveraging Contextual Information to Explore Posting and Linking Behaviors of Bloggers
The last decade has seen an explosion in blogging and the blogosphere is continuing to grow, having a large global reach and many vibrant communities. Researchers have been pouring...
Sofus A. Macskassy