Sciweavers

854 search results - page 151 / 171
» From Fuzzy - to Bipolar - Datalog
Sort
View
AUSAI
2005
Springer
15 years 3 months ago
Adaptive Utility-Based Scheduling in Resource-Constrained Systems
This paper addresses the problem of scheduling jobs in soft real-time systems, where the utility of completing each job decreases over time. We present a utility-based framework fo...
David Vengerov
CIARP
2005
Springer
15 years 3 months ago
Reward-Punishment Editing for Mixed Data
The KNN rule has been widely used in many pattern recognition problems, but it is sensible to noisy data within the training set, therefore, several sample edition methods have bee...
Raúl Rodríguez-Colín, Jes&uac...
FSE
2005
Springer
106views Cryptology» more  FSE 2005»
15 years 3 months ago
New Applications of T-Functions in Block Ciphers and Hash Functions
A T-function is a mapping from n-bit words to n-bit words in which for each 0 ≤ i < n, bit i of any output word can depend only on bits 0, 1, . . . , i of any input word. All ...
Alexander Klimov, Adi Shamir
77
Voted
FSKD
2005
Springer
90views Fuzzy Logic» more  FSKD 2005»
15 years 3 months ago
Direct Candidates Generation: A Novel Algorithm for Discovering Complete Share-Frequent Itemsets
The value of the itemset share is one way of evaluating the magnitude of an itemset. From business perspective, itemset share values reflect more the significance of itemsets for m...
Yu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang
OTM
2005
Springer
15 years 3 months ago
Ontology-Based Spatial Query Expansion in Information Retrieval
Ontologies play a key role in Semantic Web research. A common use of ontologies in Semantic Web is to enrich the current Web resources with some well-defined meaning to enhance th...
Gaihua Fu, Christopher B. Jones, Alia I. Abdelmoty