Sciweavers

5856 search results - page 461 / 1172
» Developing Query Patterns
Sort
View
ICDM
2005
IEEE
157views Data Mining» more  ICDM 2005»
15 years 10 months ago
Blocking Anonymity Threats Raised by Frequent Itemset Mining
In this paper we study when the disclosure of data mining results represents, per se, a threat to the anonymity of the individuals recorded in the analyzed database. The novelty o...
Maurizio Atzori, Francesco Bonchi, Fosca Giannotti...
153
Voted
LCN
2005
IEEE
15 years 10 months ago
On Reorder Density and its Application to Characterization of Packet Reordering
A formal approach for characterizing, evaluating and modeling packet reordering is presented. Reordering is, a phenomenon that is likely to become increasingly common on Internet,...
Nischal M. Piratla, Anura P. Jayasumana, Tarun Ban...
OTM
2005
Springer
15 years 10 months ago
Towards Ontology-Guided Design of Learning Information Systems
Courseware increasingly consists of generic information and communication tools. These offer a plethora of functionalities, but their usefulness to a particular learning community ...
Aldo de Moor
SIBGRAPI
2003
IEEE
15 years 10 months ago
Image Feature Extraction for Application of Biometric Identification of Iris - A Morphological Approach
This paper presents a new approach based on morphological operators for application of biometric identification of individuals by segmentation and analysis of the iris. Algorithms ...
Joaquim de Mira Jr., Joceli Mayer
158
Voted
ERLANG
2003
ACM
15 years 10 months ago
Extending the VoDKA architecture to improve resource modelling
VoDKA is a Video-on-Demand server developed using Erlang/OTP. In this paper, the evolution of the core architecture of the system, designed for improving resource modelling, is de...
Juan José Sánchez Penas, Carlos Abal...