Sciweavers

854 search results - page 162 / 171
» From Fuzzy - to Bipolar - Datalog
Sort
View
TMC
2011
164views more  TMC 2011»
14 years 4 months ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger
AAAI
2007
14 years 12 months ago
An Investigation into Computational Recognition of Children's Jokes
bstract or nonliving entities act or are described as living. And living things gain extra benefits such as animals talking. For this reason, the standard scripts are modified to a...
Julia M. Taylor, Lawrence J. Mazlack
WWW
2001
ACM
15 years 10 months ago
Combining RDF and XML schemas to enhance interoperability between metadata application profiles
The term "application profile" has recently become highly topical. Heery and Patel [1] define application profiles as metadata schemas which consist of metadata elements...
Jane Hunter, Carl Lagoze
173
Voted
SIGMOD
2009
ACM
175views Database» more  SIGMOD 2009»
15 years 10 months ago
Ranking distributed probabilistic data
Ranking queries are essential tools to process large amounts of probabilistic data that encode exponentially many possible deterministic instances. In many applications where unce...
Feifei Li, Ke Yi, Jeffrey Jestes
ESANN
2004
14 years 11 months ago
Neural networks for data mining: constrains and open problems
When we talk about using neural networks for data mining we have in mind the original data mining scope and challenge. How did neural networks meet this challenge? Can we run neura...
Razvan Andonie, Boris Kovalerchuk