Sciweavers

2270 search results - page 323 / 454
» The Quality of Knowledge: Knowledge Patterns and Knowledge R...
Sort
View
CAMAD
2006
IEEE
15 years 8 months ago
On the exploitation of user aggregation strategies in heterogeneous wireless networks
Abstract-- In this paper we discuss the exploitation of aggregated mobility patterns and physical proximity of nodes in a so-called ambient network, i.e., a wireless network with h...
Leonardo Badia, Nicola Bui, Marco Miozzo, Michele ...
CIKM
2006
Springer
15 years 8 months ago
An integer programming approach for frequent itemset hiding
The rapid growth of transactional data brought, soon enough, into attention the need of its further exploitation. In this paper, we investigate the problem of securing sensitive k...
Aris Gkoulalas-Divanis, Vassilios S. Verykios
CIT
2006
Springer
15 years 8 months ago
Voice Conversion by Prosody and Vocal Tract Modification
In this paper we proposed some flexible methods, which are useful in the process of voice conversion. The proposed methods modify the shape of the vocal tract system and the chara...
K. Sreenivasa Rao, B. Yegnanarayana
FLOPS
2004
Springer
15 years 8 months ago
Analysing Definitional Trees: Looking for Determinism
Abstract. This paper describes how high level implementations of (needed) narrowing into Prolog can be improved by analysing definitional trees. First, we introduce a refined repre...
Pascual Julián Iranzo, Christian Villamizar...
AUSDM
2006
Springer
144views Data Mining» more  AUSDM 2006»
15 years 8 months ago
Mining Quantitative Association Rules in Protein Sequences
Abstract. Lot of research has gone into understanding the composition and nature of proteins, still many things remain to be understood satisfactorily. It is now generally believed...
Nitin Gupta, Nitin Mangal, Kamal Tiwari, Pabitra M...