Sciweavers

745 search results - page 58 / 149
» The origins of combinatorics on words
Sort
View
CICLING
2009
Springer
16 years 2 months ago
Reducing the Plagiarism Detection Search Space on the Basis of the Kullback-Leibler Distance
Abstract. Automatic plagiarism detection considering a reference corpus compares a suspicious text to a set of original documents in order to relate the plagiarised fragments to th...
Alberto Barrón-Cedeño, Paolo Rosso, ...
PAM
2010
Springer
15 years 8 months ago
Quantifying the Pitfalls of Traceroute in AS Connectivity Inference
Although traceroute has the potential to discover AS links that are invisible to existing BGP monitors, it is well known that the common approach for mapping router IP address to A...
Yu Zhang, Ricardo V. Oliveira, Hongli Zhang, Lixia...
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
15 years 8 months ago
Privacy Preserving Decision Tree Mining from Perturbed Data
Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...
PERVASIVE
2009
Springer
15 years 8 months ago
RF-Based Initialisation for Inertial Pedestrian Tracking
Location information is an important source of context for ubiquitous computing systems. We have previously developed a wearable location system that combines a foot-mounted inerti...
Oliver Woodman, Robert Harle
CIKM
2008
Springer
15 years 3 months ago
The role of syntactic features in protein interaction extraction
Most approaches for protein interaction mining from biomedical texts use both lexical and syntactic features. However, the individual impact of these two kinds of features on the ...
Timur Fayruzov, Martine De Cock, Chris Cornelis, V...