Sciweavers

INAP
2001
Springer
14 years 1 months ago
Mining Prediction Rules from Minority Classes
Tu Bao Ho, DucDung Nguyen, Saori Kawasaki
INAP
2001
Springer
14 years 1 months ago
Discovering Frequent Itemsets in the Presence of Highly Frequent Items
This paper presents new techniques for focusing the discoveryof frequent itemsets within large, dense datasets containing highly frequent items. The existence of highly frequent i...
Dennis P. Groth, Edward L. Robertson
INAP
2001
Springer
14 years 1 months ago
iML: A Logic-based Framework for Constructing Graphical User Interface on Mobile Agents
Mobile agent technology is an emerging technology that allows easier design, implementation, and maintenance of distributed systems. Mobility enables agents to reduce network load,...
Naoki Fukuta, Nobuaki Mizutani, Tadachika Ozono, T...
INAP
2001
Springer
14 years 1 months ago
E-learning as a Vehicle for Knowledge Management
Nowadays, companies want to learn from their own experiences and to be able to enhance that experience with best principles and lessons learned from other companies. Companies emph...
Sunil Choenni, Richard Walker 0003, Robin Bakker, ...
INAP
2001
Springer
14 years 1 months ago
Towards Reconciling Use Cases via Controlled Language and Graphical Models
Abstract. In requirements engineering use cases are employed to describe the ow of events and the occurrence of states in a future information system. Use cases consist of a set of...
Kathrin Böttger, Rolf Schwitter, Diego Moll&a...
INAP
2001
Springer
14 years 1 months ago
A Modern Approach to Searching the World Wide Web: Ranking Pages by Inference over Content
The Hypertext-based Webs such as Intranets contain a vast amount of information pertaining to an enormous number of subjects. It is, however, an organically grown and thus essentia...
Bronson Trevor, Edgar Weippl, Werner Winiwarter
INAP
2001
Springer
14 years 1 months ago
ISCO: A Practical Language for Logic-Based Construction of Heterogeneous Information Systems
Universidade de ´Evora’s Integrated Information System (SIIUE) aims at representing the entire universe of concepts useful for the management and day-to-day operation of the Or...
Salvador Abreu
IH
2001
Springer
14 years 1 months ago
Computational Forensic Techniques for Intellectual Property Protection
Computational forensic engineering (CFE) aims to identify the entity that created a particular intellectual property (IP). Rather than relying on watermarking content or designs, t...
Jennifer L. Wong, Darko Kirovski, Miodrag Potkonja...
IH
2001
Springer
14 years 1 months ago
F5-A Steganographic Algorithm
Many steganographic systems are weak against visual and statistical attacks. Systems without these weaknesses offer only a relatively small capacity for steganographic messages. T...
Andreas Westfeld