![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
1,538 Result(s)
-
Chapter and Conference Paper
A Subjective and Objective Integrated Method for MAGDM Problems with Multiple Types of Exact Preference Formats
Group decision making with preference information on alternatives has become a very active research field over the last decade. Especially, the investigation on the group decision making problems based on diff...
-
Chapter and Conference Paper
Study on Efficiency and Effectiveness of KSORD
KSORD(Keyword Search Over Relational Databases) is an easy and effective way for casual users or Web users to access relational databases. In recent years, much research on KSORD has been done, and many protot...
-
Chapter and Conference Paper
Active Rules Termination Analysis Through Conditional Formula Containing Updatable Variable
While active rules have been applied in many areas including active databases, XML documentation and Semantic Web, current methods remain largely uncertain of how to terminate active behaviors. Some existing m...
-
Chapter and Conference Paper
Exploiting Uncertain Data in Support Vector Classification
A new approach of input uncertainty classification is proposed in this paper. This approach develops a new technique which extends the support vector classification (SVC) by incorporating input uncertainties. ...
-
Chapter and Conference Paper
SAM: An Efficient Algorithm for F&B-Index Construction
Using index to process structural queries on XML data is a natural way. F&B-Index has been proven to be the smallest index which covers all branching path queries. One disadvantage which prevents the wide usag...
-
Chapter and Conference Paper
Combining Smooth Graphs with Semi-supervised Learning
The key points of the semi-supervised learning problem are the label smoothness and cluster assumptions. In graph-based semi-supervised learning, graph representations of the data are so important that differe...
-
Chapter and Conference Paper
Use of Chinese Short Messages
Short text message (SMS) as a key communication means in China received a lot of attention in research community. 114 subjects attended the study, sharing totally 10843 SMS they sent and received daily. We div...
-
Chapter and Conference Paper
A Fast Reading Spatial Knowledge System by Ultrasonic Sound Beams
PC users can retrieve lots of common information by Internet search engines. A text-to-speech (TTS) system allows citizens to easily access the public report from the city etc. However it takes a long time for...
-
Chapter and Conference Paper
An Efficient Dictionary Mechanism Based on Double-Byte
Dictionary is an efficient management of large sets of distinct strings in memory. It has significant influence on Natural Language Process, Information Retrieval and other areas. In this paper, we propose an ...
-
Chapter and Conference Paper
Distributed Knowledge Management Based on Ontological Engineering and Multi-Agent System Towards Semantic Interoperation
Currently, the available architectures for knowledge management are mainly centralized and focus on basic string processing in essence. They tend to ignore that knowledge is distributed and full of semantics i...
-
Chapter and Conference Paper
A Distributed Genetic Algorithm for Optimizing the Quality of Grid Workflow
The advancement of Grid and Web service technologies greatly facilitates the aggregation of distributed applications. As the grid workflow generally involves long lasting execution tasks, the quality optimizat...
-
Chapter and Conference Paper
CACS: A Novel Classification Algorithm Based on Concept Similarity
This paper proposes a novel algorithm of classification based on the similarities among data attributes. This method assumes data attributes of dataset as basic vectors of m dimensions, and each tuple of datas...
-
Chapter and Conference Paper
Exploring Content and Linkage Structures for Searching Relevant Web Pages
This work addresses the problem of Web searching for pages relevant to a query URL. Based on an approach that uses a deep linkage analysis among vicinity pages, we investigate the Web page content structures a...
-
Chapter and Conference Paper
Finding Unsatisfiable Subformulas with Stochastic Method
Explaining the causes of infeasibility of Boolean formulas has many practical applications in various fields. A small unsatisfiable subformula provides a succinct explanation of infeasibility and is valuable f...
-
Chapter and Conference Paper
Efficient Keyword Search over Data-Centric XML Documents
We in this paper investigate keyword search over data-centric XML documents. We first present a novel method to divide an XML document into self-integrated subtrees, which are connected subtrees and can captur...
-
Chapter and Conference Paper
Independent Factor Reinforcement Learning for Portfolio Management
In this paper we propose to do portfolio management using reinforcement learning (RL) and independent factor model. Factors in independent factor model are mutually independent and exhibit better predictabilit...
-
Chapter and Conference Paper
CLEF-2006 CL-SR at Maryland: English and Czech
The University of Maryland participated in the English and Czech tasks. For English, one monolingual run using fields based on automatic transcription (the required condition) and one (otherwise identical) cro...
-
Chapter and Conference Paper
Contention-Free Communication Scheduling for Group Communication in Data Parallelism
Group communication significantly influences the performance of data parallel applications. It is required often in two situations: one is array redistribution from phase to phase; the other is array remap**...
-
Chapter and Conference Paper
A Study on Mobile Agent Based Resource Management in Grid
The cost models for estimating the response time have been presented, and the architecture of grid resource management based on mobile agent is given in this paper. An integration of mobile agent technology wi...
-
Chapter and Conference Paper
The Automatic Peer-to-Peer Signature for Source Address Validation
SPM (Spoofing Prevention Method) proposed a peer-to-peer anti-spoofing method which could effectively filter spoofed packets and support incremental deployment. However, mechanism of SPM key updating has some ...