Sciweavers

9425 search results - page 1639 / 1885
» Some Notes on Models and Modelling
Sort
View
DLOG
2010
15 years 1 months ago
Distance-based Measures of Inconsistency and Incoherency for Description Logics
Abstract. Inconsistency and incoherency are two sorts of erroneous information in a DL ontology which have been widely discussed in ontology-based applications. For example, they h...
Yue Ma, Pascal Hitzler
ECAI
2010
Springer
15 years 1 months ago
From bursty patterns to bursty facts: The effectiveness of temporal text mining for news
Many document collections are by nature dynamic, evolving as the topics or events they describe change. The goal of temporal text mining is to discover bursty patterns and to ident...
Ilija Subasic, Bettina Berendt
127
Voted
GAMESEC
2010
15 years 1 months ago
ISPs and Ad Networks Against Botnet Ad Fraud
Botnets are a serious threat on the Internet and require huge resources to be thwarted. ISPs are in the best position to fight botnets and there are a number of recently proposed i...
Nevena Vratonjic, Mohammad Hossein Manshaei, Maxim...
GCB
2010
Springer
204views Biometrics» more  GCB 2010»
15 years 1 months ago
Learning Pathway-based Decision Rules to Classify Microarray Cancer Samples
: Despite recent advances in DNA chip technology current microarray gene expression studies are still affected by high noise levels, small sample sizes and large numbers of uninfor...
Enrico Glaab, Jonathan M. Garibaldi, Natalio Krasn...
ICICS
2010
Springer
15 years 1 months ago
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either lo...
Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferr...
« Prev « First page 1639 / 1885 Last » Next »