In this paper we present a new approach to mining binary data. We treat each binary feature (item) as a means of distinguishing two sets of examples. Our interest is in selecting ...
This paper presents an automatic deforestation system, stream fusion, based on equational transformations, that fuses a wider range of functions than existing short-cut fusion sys...
Virtual communities are a popular phenomenon today. They are significantly altering the specifics of how people work, spend their free time and interact socially. Moreover, they h...
— The paper focuses on multi-hop routing mechanism used in relay based WiMAX networks. The proposal how to acquire channel state information (CSI) on relay and access path for de...
Security API analysis typically only considers a subset of an API’s functions, with results bounded by the number of function calls. Furthermore, attacks involving partial leakag...