Sciweavers

1412 search results - page 84 / 283
» types 2004
Sort
View
129
Voted
PAKDD
2004
ACM
164views Data Mining» more  PAKDD 2004»
15 years 10 months ago
FP-Bonsai: The Art of Growing and Pruning Small FP-Trees
Abstract. In the context of mining frequent itemsets, numerous strategies have been proposed to push several types of constraints within the most well known algorithms. In this pap...
Francesco Bonchi, Bart Goethals
142
Voted
PCM
2004
Springer
106views Multimedia» more  PCM 2004»
15 years 10 months ago
An Immunological Approach to Raising Alarms in Video Surveillance
Inspired by the human immune system, and in particular the negative selection algorithm, we propose a learning mechanism that enables the detection of abnormal activities. Three ty...
Lukman Sasmita, Wanquan Liu, Svetha Venkatesh
121
Voted
PEPM
2004
ACM
15 years 10 months ago
Fusion with stacks and accumulating parameters
We propose a new algorithm for fusion transformation that allows both stacks and accumulating parameters. The new algorithm can fuse programs that cannot be handled by existing fu...
Susumu Nishimura
PET
2004
Springer
15 years 10 months ago
Language-Based Enforcement of Privacy Policies
Abstract. We develop a language-based approach for modeling and verifying aspects of privacy policies. Our approach relies on information-flow control. Concretely, we use the prog...
Katia Hayati, Martín Abadi
PPSN
2004
Springer
15 years 10 months ago
Evaluation of Adaptive Nature Inspired Task Allocation Against Alternate Decentralised Multiagent Strategies
Adaptive multiagent algorithms based upon the behaviour of social insects are powerful decentralised systems capable of solving complex problems. The intelligence of such a system ...
Richard Price, Peter Tiño