Transforming Nescient Activity into Intelligent Activity (English)
- New search for: Haque, R.
- New search for: Krdzavac, N.
- New search for: Butler, T.
- New search for: Haque, R.
- New search for: Krdzavac, N.
- New search for: Butler, T.
- New search for: Xiang, Yang
- New search for: Pathan, Mukaddim
- New search for: Tao, Xiaohui
In:
Data and knowledge engineering; ICDKE 2012
7696
;
29-37
;
2012
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Transforming Nescient Activity into Intelligent Activity
-
Contributors:Haque, R. ( author ) / Krdzavac, N. ( author ) / Butler, T. ( author ) / Xiang, Yang / Pathan, Mukaddim / Tao, Xiaohui
-
Conference:International conference; 3rd, Data and knowledge engineering; ICDKE 2012 ; 2012 ; Wuyishan, China
-
Published in:Data and knowledge engineering; ICDKE 2012 , 7696 ; 29-37LECTURE NOTES IN COMPUTER SCIENCE , 7696 ; 29-37
-
Publisher:
- New search for: Springer
-
Place of publication:Heidelberg
-
Publication date:2012-01-01
-
Size:9 pages
-
Remarks:Includes bibliographical references and index. Also issued online.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
OR-Tree: An Optimized Spatial Tree Index for Flash-Memory Storage SystemsWang, N. / Jin, P. / Wan, S. / Zhang, Y. / Yue, L. et al. | 2012
- 15
-
Directional Skyline QueriesEl-Dawy, E. / Mokhtar, H.M.O. / El-Bastawissy, A. et al. | 2012
- 29
-
Transforming Nescient Activity into Intelligent ActivityHaque, R. / Krdzavac, N. / Butler, T. et al. | 2012
- 38
-
Self-adaptive Non-stationary Parallel Multisplitting Two-Stage Iterative Methods for Linear SystemsMeng, G.-Y. / Wang, C.-L. / Yan, X.-H. et al. | 2012
- 48
-
Towards a Case-Based Reasoning Approach Based on Ontologies Application to Railroad AccidentsMaalel, A. / Mejri, L. / Hadj-Mabrouk, H. / Ghezela, H.B. et al. | 2012
- 56
-
An Agile Knowledge Discovery in Databases Software Processdo Nascimento, G.S. / de Oliveira, A.A. et al. | 2012
- 65
-
An Innovative Outlier Detection Method Using Localized ThresholdsZhang, J. / Cao, J. / Zhu, X. et al. | 2012
- 74
-
A Self-stabilizing Algorithm for Finding a Minimal K-Dominating Set in General NetworksWang, G. / Wang, H. / Tao, X. / Zhang, J. et al. | 2012
- 86
-
Optimal Combination of Feature Weight Learning and Classification Based on Local ApproximationCai, H. / Ng, M. et al. | 2012
- 95
-
A Model of User-Oriented Reduct Construction Based on Minimal Set CoverHan, S. / Yin, G. et al. | 2012
- 103
-
Determining Pattern Similarity in a Medical Recommender SystemKomkhao, M. / Lu, J. / Zhang, L. et al. | 2012
- 115
-
Chinese Latent Relational Search Based on Relational SimilarityLiang, C. / Lu, Z. et al. | 2012
- 128
-
Wikipedia Category Graph and New Intrinsic Information Content Metric for Word Semantic Relatedness MeasuringTaieb, M.A.H. / Aouicha, M.B. / Tmar, M. / Hamadou, A.B. et al. | 2012
- 141
-
Nautilus: A Generic Framework for Crawling Deep WebZhao, J. / Wang, P. et al. | 2012
- 152
-
Retrieving Information from Microblog Using Pattern Mining and Relevance FeedbackLau, C.H. / Tao, X. / Tjondronegoro, D. / Li, Y. et al. | 2012
- 161
-
A Secure and Efficient Mix Network Especially Suitable for E-VotingPeng, K. et al. | 2012
- 175
-
Power Analysis Based Reverse Engineering on the Secret Round Function of Block CiphersTang, M. / Qiu, Z. / Li, W. / Liu, S. / Zhang, H. et al. | 2012
- 189
-
PEVS: A Secure Electronic Voting Scheme Using Polling BoothsBased, M.A. / Tsay, J.-K. / Mjolsnes, S.F. et al. | 2012
- 206
-
Certificate-Based Key-Insulated SignatureDu, H. / Li, J. / Zhang, Y. / Li, T. et al. | 2012
- 221
-
The Generalized Construction and Linear Complexity of Binary Sequences with Three-Level Autocorrelation ValuesChang, Z. / Li, D. et al. | 2012
- 230
-
Anonymous Hierarchical Identity-Based Encryption in Prime Order GroupsRen, Y. / Wang, S. / Zhang, X. et al. | 2012
- 243
-
Weaknesses of ``Security Analysis and Enhancement for Three-Party Password-Based Authenticated Key Exchange Protocol''Khan, M.K. / He, D. et al. | 2012