Sciweavers

1697 search results - page 331 / 340
» Supporting the design of service contracts with interaction ...
Sort
View
TMC
2008
159views more  TMC 2008»
14 years 7 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
CIKM
2007
Springer
15 years 3 months ago
Improving the classification of newsgroup messages through social network analysis
Newsgroup participants interact with their communities through conversation threads. They may respond to a message to answer a question, debate a topic, support or disagree with a...
Blaz Fortuna, Eduarda Mendes Rodrigues, Natasa Mil...
UIST
1993
ACM
15 years 1 months ago
A Framework for Shared Applications with a Replicated Architecture
n support in a user interface toolkit: flexible, robust, and reusable abstractions SE Hudson, JT Stasko - 1993 - ACM Press New York, NY, USA 62 1992: Two-handed gesture in multi-mo...
Thomas Berlage, Andreas Genau
KDD
2009
ACM
269views Data Mining» more  KDD 2009»
15 years 10 months ago
Extracting discriminative concepts for domain adaptation in text mining
One common predictive modeling challenge occurs in text mining problems is that the training data and the operational (testing) data are drawn from different underlying distributi...
Bo Chen, Wai Lam, Ivor Tsang, Tak-Lam Wong
TPHOL
2009
IEEE
15 years 4 months ago
A Formalisation of Smallfoot in HOL
In this paper a general framework for separation logic inside the HOL theorem prover is presented. This framework is based on Abeparation Logic. It contains a model of an abstract,...
Thomas Tuerk