Sciweavers

ACSC
2008
IEEE
13 years 6 months ago
An efficient hash-based algorithm for minimal k-anonymity
A number of organizations publish microdata for purposes such as public health and demographic research. Although attributes of microdata that clearly identify individuals, such a...
Xiaoxun Sun, Min Li, Hua Wang, Ashley W. Plank
ACSC
2008
IEEE
13 years 6 months ago
An investigation of the state formation and transition limitations for prediction problems in recurrent neural networks
Recurrent neural networks are able to store information about previous as well as current inputs. This "memory" allows them to solve temporal problems such as language r...
Angel Kennedy, Cara MacNish
ACSC
2008
IEEE
13 years 11 months ago
A model, schema, and interface for metadata file systems
Modern computer systems are based on the traditional hierarchical file system model, but typically contain large numbers of files with complex interrelationships. This tradition...
Stijn Dekeyser, Richard Watson, Lasse Motrø...
ACSC
2008
IEEE
13 years 11 months ago
Automatic thesaurus construction
1 In this paper we introduce a novel method of automating thesauri using syntactically constrained distributional similarity. With respect to syntactically conditioned cooccurrence...
Dongqiang Yang, David M. W. Powers
ACSC
2008
IEEE
13 years 11 months ago
Integrating recommendation models for improved web page prediction accuracy
Recent research initiatives have addressed the need for improved performance of Web page prediction accuracy that would profit many applications, ebusiness in particular. Differ...
Faten Khalil, Jiuyong Li, Hua Wang
ACSC
2008
IEEE
13 years 11 months ago
An investigation on a community's web search variability
Users’ past search behaviour provides a rich context that an information retrieval system can use to tailor its search results to suit an individual’s or a community’s infor...
Mingfang Wu, Andrew Turpin, Justin Zobel
ACSC
2008
IEEE
13 years 11 months ago
Informatics olympiads: challenges in programming and algorithm design
The International Olympiad in Informatics is a worldwide contest for high school students, with a strong focus on creativity and ingenuity in algorithm design. Here we describe th...
Benjamin A. Burton
ACSC
2008
IEEE
13 years 11 months ago
Product flow analysis in distribution networks with a fixed time horizon
The movement of items through a product distribution network is a complex dynamic process which depends not only on the network’s static topology but also on a knowledge of how ...
Moe Thandar Wynn, Colin J. Fidge, Arthur H. M. ter...
ACSC
2008
IEEE
13 years 11 months ago
On illegal composition of first-class agent interaction protocols
In this paper, we examine the composition of firstclass protocols for multi-agent systems. First-class protocols are protocols that exist as executable specifications that agent...
Tim Miller, Peter McBurney