Sciweavers

17366 search results - page 3344 / 3474
» New Revision Algorithms
Sort
View
ICISS
2005
Springer
15 years 10 months ago
Event Detection in Multilevel Secure Active Databases
The event-condition-action paradigm (also known as triggers or rules) is a powerful technology. It gives a database “active” capabilities – the ability to react automatically...
Indrakshi Ray, Wei Huang
INDOCRYPT
2005
Springer
15 years 10 months ago
On the Algebraic Immunity of Symmetric Boolean Functions
In this paper, we analyse the algebraic immunity of symmetric Boolean functions. We identify a set of lowest degree annihilators for symmetric functions and propose an efficient al...
An Braeken, Bart Preneel
ISI
2005
Springer
15 years 10 months ago
Information Supply Chain: A Unified Framework for Information-Sharing
To balance demand and supply of information, we propose a framework called “information supply chain” (ISC). This framework is based on supply chain management (SCM), which has...
Shuang Sun, John Yen
KDD
2005
ACM
103views Data Mining» more  KDD 2005»
15 years 10 months ago
Key semantics extraction by dependency tree mining
We propose a new text mining system which extracts characteristic contents from given documents. We define Key semantics as characteristic sub-structures of syntactic dependencie...
Satoshi Morinaga, Hiroki Arimura, Takahiro Ikeda, ...
140
Voted
RSFDGRC
2005
Springer
192views Data Mining» more  RSFDGRC 2005»
15 years 10 months ago
An Open Source Microarray Data Analysis System with GUI: Quintet
We address Quintet, an R-based unified cDNA microarray data analysis system with GUI. Five principal categories of microarray data analysis have been coherently integrated in Quin...
Jun-kyoung Choe, Tae-Hoon Chung, Sunyong Park, Hwa...
« Prev « First page 3344 / 3474 Last » Next »