Sciweavers

3471 search results - page 621 / 695
» User activity histories
Sort
View
JIIS
2008
104views more  JIIS 2008»
14 years 9 months ago
A framework for checking proofs naturally
We propose a natural framework, called NF, which supports development of formal proofs on a computer. NF is based on a theory of Judgments and Derivations. NF is designed by observ...
Masahiko Sato
ITSSA
2006
182views more  ITSSA 2006»
14 years 9 months ago
Application of Business Process Execution Language to Scientific Workflows
: This paper investigates the use of the Business Process Execution Language for Web services (BPEL4WS/ BPEL) for managing scientific workflows. The complexity, unpredictability an...
Asif Akram, David Meredith, Rob Allan
JCM
2006
135views more  JCM 2006»
14 years 9 months ago
Bandwidth Allocation and Session Scheduling using SIP
Session Initiation Protocol (SIP) is a new signaling protocol designed to establish multimedia sessions in telecommunication networks. In this paper, we suggest the extension of SI...
Hassan Hassan 0002, Jean-Marie Garcia, Olivier Bru...
JMLR
2006
125views more  JMLR 2006»
14 years 9 months ago
Spam Filtering Using Statistical Data Compression Models
Spam filtering poses a special problem in text categorization, of which the defining characteristic is that filters face an active adversary, which constantly attempts to evade fi...
Andrej Bratko, Gordon V. Cormack, Bogdan Filipic, ...
KAIS
2006
77views more  KAIS 2006»
14 years 9 months ago
Finding centric local outliers in categorical/numerical spaces
Outlier detection techniques are widely used in many applications such as credit card fraud detection, monitoring criminal activities in electronic commerce, etc. These application...
Jeffrey Xu Yu, Weining Qian, Hongjun Lu, Aoying Zh...