Sciweavers

4340 search results - page 738 / 868
» Formal Methods and Cryptography
Sort
View
IDA
2005
Springer
15 years 10 months ago
From Local Pattern Mining to Relevant Bi-cluster Characterization
Clustering or bi-clustering techniques have been proved quite useful in many application domains. A weakness of these techniques remains the poor support for grouping characterizat...
Ruggero G. Pensa, Jean-François Boulicaut
IFL
2005
Springer
15 years 10 months ago
Polytypic Syntax Tree Operations
Polytypic functional programming has the advantage that it can derive code for generic functions automatically. However, it is not clear whether it is useful for anything other tha...
Arjen van Weelden, Sjaak Smetsers, Rinus Plasmeije...
ILP
2005
Springer
15 years 10 months ago
Spatial Clustering of Structured Objects
Clustering is a fundamental task in Spatial Data Mining where data consists of observations for a site (e.g. areal units) descriptive of one or more (spatial) primary units, possib...
Donato Malerba, Annalisa Appice, Antonio Varlaro, ...
129
Voted
OTM
2005
Springer
15 years 10 months ago
QoS-Based Service Selection and Ranking with Trust and Reputation Management
Abstract. QoS-based service selection mechanisms will play an essential role in service-oriented architectures, as e-Business applications want to use services that most accurately...
Le-Hung Vu, Manfred Hauswirth, Karl Aberer
PPDP
2005
Springer
15 years 10 months ago
Program transformation by templates based on term rewriting
Huet and Lang (1978) presented a framework of automated program transformation based on lambda calculus in which programs are transformed according to a given program transformati...
Yuki Chiba, Takahito Aoto, Yoshihito Toyama