Abstract. The most popular data mining techniques consist in searching databases for frequently occurring patterns, e.g. association rules, sequential patterns. We argue that in co...
Tadeusz Morzy, Marek Wojciechowski, Maciej Zakrzew...
We propose an hardware solution to several security problems that are difficult to solve on classical processor architectures, like licensing, electronic commerce, or software pri...
We use combinatorial methods and permutation groups to classify homogeneous boolean functions. The property of symmetry of a boolean function limits the size of the function’s cl...
Jedi (Java based Extraction and Dissemination of Information) is a lightweight tool for the creation of wrappers and mediators to extract, combine, and reconcile information from ...
Gerald Huck, Peter Fankhauser, Karl Aberer, Erich ...
The use of speech and auditory interaction on wearable computers can provide an awareness of events and personal messages, without requiring one's full attention or disruptin...