Sciweavers

745 search results - page 102 / 149
» The origins of combinatorics on words
Sort
View
ENTCS
2006
116views more  ENTCS 2006»
14 years 10 months ago
How Recent is a Web Document?
One of the most important aspects of a Web document is its up-to-dateness or recency. Up-to-dateness is particularly relevant to Web documents because they usually contain content...
Bo Hu, Florian Lauck, Jan Scheffczyk
ENTCS
2006
123views more  ENTCS 2006»
14 years 10 months ago
Wrapping of Web Sources with restricted Query Interfaces by Query Tunneling
Information sources in the World Wide Web usually offer two different schemes to their users, an Interface Schema which the user can query and a Result Schema which the user can b...
Thomas Kabisch, Mattis Neiling
ENTCS
2006
173views more  ENTCS 2006»
14 years 10 months ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin
ENTCS
2006
144views more  ENTCS 2006»
14 years 10 months ago
Infinitary Howe's Method
Howe's method is a well-known technique for proving that various kinds of applicative bisimilarity (or similarity) on a functional language are congruences (or precongruences...
Paul Blain Levy
103
Voted
INFORMATICALT
2008
196views more  INFORMATICALT 2008»
14 years 10 months ago
An Efficient and Sensitive Decision Tree Approach to Mining Concept-Drifting Data Streams
Abstract. Data stream mining has become a novel research topic of growing interest in knowledge discovery. Most proposed algorithms for data stream mining assume that each data blo...
Cheng-Jung Tsai, Chien-I Lee, Wei-Pang Yang