Sciweavers

368 search results - page 37 / 74
» The Information Lost in Erasures
Sort
View
CSFW
1996
IEEE
14 years 25 days ago
An Immunological Approach to Change Detection: Theoretical Results
: This paper examines some of the theoretical foundations of the distributable change detection method introduced by Forrest et al. in [10], including fundamental bounds on some of...
Patrik D'haeseleer
SIGMOD
1996
ACM
110views Database» more  SIGMOD 1996»
14 years 24 days ago
Mining Quantitative Association Rules in Large Relational Tables
We introduce the problem of mining association rules in large relational tables containing both quantitative and categorical attributes. An example of such an association might be...
Ramakrishnan Srikant, Rakesh Agrawal
DEXAW
2004
IEEE
80views Database» more  DEXAW 2004»
14 years 11 days ago
Traceable Document Flows
Ad-hoc data exchange, e.g., by sending email attachments, leads to multiple copies or versions of a document at dispersed nodes in a network. However, their relationships such as ...
Martin Bernauer, Gerti Kappel, Elke Michlmayr
AAAI
2010
13 years 10 months ago
How Incomplete Is Your Semantic Web Reasoner?
Conjunctive query answering is a key reasoning service for many ontology-based applications. In order to improve scalability, many Semantic Web query answering systems give up com...
Giorgos Stoilos, Bernardo Cuenca Grau, Ian Horrock...
CATA
2004
13 years 10 months ago
Annotating Linguistic Data with ImageSpace for the Preservation of Endangered Languages
Many languages are in serious danger of being lost and as a result, there has been a significant increase in language documentation projects, and also in attempts to preserve lang...
Shiyong Lu, Rong Huang, Farshad Fotouhi