In data mining applications, highly sized contexts are handled what usually results in a considerably large set of frequent itemsets, even for high values of the minimum support t...
Tarek Hamrouni, Sadok Ben Yahia, Engelbert Mephu N...
chool of Business Research – FY 2007 Research Abstracts Dare to Share: Protecting Sensitive Knowledge with Data Sanitization Data sanitization is a process that is used to promot...
The firing rule of Petri nets relies on a residuation operation for the commutative monoid of natural numbers. We identify a class of residuated commutative monoids, called Petri ...
The dissemination of information in social networks and the relative effect of ICT (Information and Communications Technology) use has long been an interesting area of study in the...
Liaquat Hossain, Kon Shing Kenneth Chung, Shahriar...
One strategy for increasing the usefulness, ease of use and satisfaction of wireless navigation and related services is to tailor a package of services to meet the requirements of ...