Sciweavers

194 search results - page 39 / 39
» Incremental Extraction of Association Rules in Applicative D...
Sort
View
CODES
2005
IEEE
13 years 10 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
ICCS
2009
Springer
13 years 11 months ago
Distinguishing Answers in Conceptual Graph Knowledge Bases
Abstract. In knowledge bases, the open world assumption and the ability to express variables may lead to an answer redundancy problem. This problem occurs when the returned answers...
Nicolas Moreau, Michel Leclère, Madalina Cr...
IPPS
2003
IEEE
13 years 10 months ago
A Compilation Framework for Distributed Memory Parallelization of Data Mining Algorithms
With the availability of large datasets in a variety of scientific and commercial domains, data mining has emerged as an important area within the last decade. Data mining techni...
Xiaogang Li, Ruoming Jin, Gagan Agrawal
IPM
2007
182views more  IPM 2007»
13 years 4 months ago
A probabilistic music recommender considering user opinions and audio features
A recommender system has an obvious appeal in an environment where the amount of on-line information vastly outstrips any individual’s capability to survey. Music recommendation...
Qing Li, Sung-Hyon Myaeng, Byeong Man Kim