Sciweavers

1544 search results - page 206 / 309
» The Process of Adoption
Sort
View
TASE
2007
IEEE
15 years 10 months ago
Constraint-Based Policy Negotiation and Enforcement for Telco Services
Telco services are evolving under several aspects: for instance, services may combine different telecommunication features (messaging, multi-media, etc.) and may be activated and...
Maria Grazia Buscemi, Laura Ferrari, Corrado Moiso...
ATAL
2007
Springer
15 years 10 months ago
Multi-task overlapping coalition parallel formation algorithm
The issue of coalition formation has been investigated from many aspects, but until recently little attention has been paid to overlapping coalition formation. What’s more, an a...
Chao-Feng Lin, Shan-Li Hu
AUSDM
2007
Springer
113views Data Mining» more  AUSDM 2007»
15 years 10 months ago
PCITMiner- Prefix-based Closed Induced Tree Miner for finding closed induced frequent subtrees
Frequent subtree mining has attracted a great deal of interest among the researchers due to its application in a wide variety of domains. Some of the domains include bio informati...
Sangeetha Kutty, Richi Nayak, Yuefeng Li
BTW
2007
Springer
106views Database» more  BTW 2007»
15 years 10 months ago
Context-Based Data Tailoring for Mobile Users
: Independent, heterogeneous, distributed, sometimes transient and mobile data sources produce an enormous amount of information that should be semantically integrated and filtere...
Letizia Tanca
CIS
2007
Springer
15 years 10 months ago
Mining with Noise Knowledge: Error Aware Data Mining
—Real-world data mining deals with noisy information sources where data collection inaccuracy, device limitations, data transmission and discretization errors, or man-made pertur...
Xindong Wu