Sciweavers

416 search results - page 69 / 84
» Some new approaches for preventing software tampering
Sort
View
ACL
1992
15 years 18 days ago
SEXTANT: Exploring Unexplored Contexts for Semantic Extraction from Syntactic Analysis
For a very long time, it has been considered that the only way of automatically extracting similar groups of words from a text collection for which no semantic information exists ...
Gregory Grefenstette
KDD
2008
ACM
246views Data Mining» more  KDD 2008»
15 years 12 months ago
Direct mining of discriminative and essential frequent patterns via model-based search tree
Frequent patterns provide solutions to datasets that do not have well-structured feature vectors. However, frequent pattern mining is non-trivial since the number of unique patter...
Wei Fan, Kun Zhang, Hong Cheng, Jing Gao, Xifeng Y...
ICCBR
2001
Springer
15 years 3 months ago
Meta-case-Based Reasoning: Using Functional Models to Adapt Case-Based Agents
It is useful for an intelligent software agent to be able to adapt to new demands from an environment. Such adaptation can be viewed as a redesign problem; an agent has some origin...
J. William Murdock, Ashok K. Goel
FSTTCS
2010
Springer
14 years 9 months ago
The effect of girth on the kernelization complexity of Connected Dominating Set
In the Connected Dominating Set problem we are given as input a graph G and a positive integer k, and are asked if there is a set S of at most k vertices of G such that S is a dom...
Neeldhara Misra, Geevarghese Philip, Venkatesh Ram...
COMPSAC
1996
IEEE
15 years 3 months ago
Handling Multimedia Data for Mobile Computers
Mobile clients have unusual needs for sending and receiving multimedia data. The traditional client/server paradigm does not take into account variable network conditions; thus tr...
Charles E. Perkins