نتایج جستجو برای: discover

تعداد نتایج: 35600  

Journal: :IEEE Trans. Knowl. Data Eng. 2012
Jixue Liu Jiuyong Li Chengfei Liu Yongfeng Chen

Functional and inclusion dependency discovery is important to knowledge discovery, database semantics analysis, database design, and data quality assessment. Motivated by the importance of dependency discovery, this paper reviews the methods for functional dependency, conditional functional dependency, approximate functional dependency and inclusion dependency discovery in relational databases ...

2007
X. Artigas J. Ascenso M. Dalai S. Klomp D. Kubasov M. Ouaret

Distributed Video Coding is becoming more and more popular among the research community, because of its interesting theoretical contributions and because there are still many open problems waiting to be solved. This paper introduces the codec architecture and the associated tools adopted by DISCOVER (DIStributed COding for Video sERvices), a European project which has been devoted to the advanc...

Journal: :Informatica (Slovenia) 2010
Tatiana Kichkaylo Tatyana Ryutov Michael D. Orosz Robert Neches

A major function of a security analyst is to analyze collected intelligence looking for plans, associated events, or other evidence that may identify an adversary’s intent. Armed with this knowledge, the analyst then develops potential responses (e.g., countermeasures) to deter the discovered plan or plans, weighs their strengths and weaknesses (e.g., collateral damage) and then makes a recomme...

2008
Kafil Hajlaoui Xavier Boucher Mihaela Juganaru-Mathieu

Within the framework of Virtual Organisations (VO), a decision aid approach was developed to support the identification of collaborative corporate networks. This approach is based on an automated procedure of information extraction to identify key features of potential partners. The added value of this research is to operate in an "open universe" of potential partners, using the company interne...

2016
Qianyi Zhan Jiawei Zhang Philip S. Yu Sherry Emery Junyuan Xie

Traditional viral marketing problem aims at selecting a set of influential seed users to maximize the awareness of products and ideas in one single social network. However, in real scenarios, users’ profiles in the target social network (e.g., Facebook) are usually confidential to the public, which block the conventional viral marketing strategies reaching the target consumers effectively. Inst...

Journal: :Digital Investigation 2015
Pritheega Magalingam Stephen Davis Asha Rao

Extracting communities using existing community detection algorithms yields dense sub-networks that are difficult to analyse. Extracting a smaller sample that embodies the relationships of a list of suspects is an important part of the beginning of an investigation. In this paper, we present the efficacy of our shortest paths network search algorithm (SPNSA) that begins with an ‘algorithm feed’...

2013
Wil M. P. van der Aalst

Process mining aims to discover, monitor and improve real processes by extracting knowledge from event logs abundantly available in today’s information systems. Although process mining has been applied in hundreds of organizations and process mining techniques have been embedded in a variety of commercial tools, to date these techniques have rarely been used for analyzing web services. One of t...

2009
David H. Bailey

By an integer relation algorithm, we mean a practical computational scheme that can recover the vector of integers ai, if it exists, or can produce bounds within which no integer relation exists. As we will see in the examples below, an integer relation algorithm can be used to recognize a computed constant in terms of a formula involving known constants, or to discover an underlying relation b...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید