Mining frequent patterns in a data stream is very challenging for the high complexity of managing patterns with bounded memory against the unbounded data. While many approaches as...
K-anonymity is a simple yet practical mechanism to protect privacy against attacks of re-identifying individuals by joining multiple public data sources. All existing methods achi...
Jian Pei, Jian Xu, Zhibin Wang, Wei Wang 0009, Ke ...
Many enterprises nowadays use business processes, based on the BPEL standard, to achieve their goals. These are complex, often distributed, processes. Monitoring the execution of ...
In this paper we present a novel, ontology-based approach to service discovery, which exploits domain knowledge and semantic service descriptions to guide the service discovery pr...
Devis Bianchini, Valeria De Antonellis, Michele Me...
Several time series matching techniques have been proposed for content-based music retrieval. These techniques represent a melody by a time series of pitch values and use time war...