Sciweavers

1829 search results - page 318 / 366
» aims 2008
Sort
View
DKE
2006
157views more  DKE 2006»
14 years 12 months ago
XML structural delta mining: Issues and challenges
Recently, there is an increasing research efforts in XML data mining. These research efforts largely assumed that XML documents are static. However, in reality, the documents are ...
Qiankun Zhao, Ling Chen 0002, Sourav S. Bhowmick, ...
IJCSA
2008
237views more  IJCSA 2008»
14 years 11 months ago
Development of A SOLAP Patrimony Management Application System: Fez Medina as a Case Study
It is well known that transactional and analytical systems each require different database architecture. In general, the database structure of transactional systems is optimized f...
I. Salam, M. El Mohajir, A. Taleb, B. El Mohajir
IJISEC
2008
69views more  IJISEC 2008»
14 years 11 months ago
A survey of certificateless encryption schemes and security models
Abstract This paper surveys the literature on certificateless encryption schemes. In particular, we examine the large number of security models that have been proposed to prove the...
Alexander W. Dent
IPM
2008
141views more  IPM 2008»
14 years 11 months ago
Towards a unified approach to document similarity search using manifold-ranking of blocks
Document similarity search (i.e. query by example) aims to retrieve a ranked list of documents similar to a query document in a text corpus or on the Web. Most existing approaches...
Xiaojun Wan, Jianwu Yang, Jianguo Xiao
105
Voted
IS
2008
14 years 11 months ago
Conformance checking of processes based on monitoring real behavior
Many companies have adopted Process-aware Information Systems (PAIS) to support their business processes in some form. On the one hand these systems typically log events (e.g., in ...
Anne Rozinat, Wil M. P. van der Aalst