Browsing Closed by Title

DSpace/Manakin Repository

Search OPUS


Advanced Search

Browse

My Account

Browsing Closed by Title

Sort by: Order: Results:

  • Henderson-Sellers, B (SPRINGER-VERLAG BERLIN, 2011-01-01)
  • Zhang, H; Zhao, Y; Cao, L; Zhang, C; Bohlscheid, H (IGI Global, 2010-01)
    In this chapter, the authors propose a novel framework for rare class association rule mining. In each class association rule, the right-hand is a target class while the left-hand may contain one or more attributes. This ...
  • Luo, C; Zhao, Y; Luo, D; Ou, Y; Liu, L (IGI Global, 2010-01)
    This chapter aims to provide a comprehensive survey of the current advanced technologies of exception mining in stock market. The stock market surveillance is to identify market anomalies so as to provide a fair and efficient ...
  • Zeng, C; Jia, W; He, S; Xu, M (IGI Global, 2013-01)
    Image segmentation techniques using graph theory has become a thriving research area in computer vision community in recent years. This chapter mainly focuses on the most up-to-date research achievements in graph-based ...
  • Xiao, B; Gao, X; Tao, D; Li, X (Springer-Verlag Berlin / Heidelberg, 2011-01)
    Summary. Face recognition by sketches in photos makes an important complement to face photo recognition. It is challenging because sketches and photos have geometrical deformations and texture difference. Aiming to achieve ...
  • Li, L; Xiao, H; Xu, G (IGI Global, 2013)
    Computing similarity between short microblogs is an important step in microblog recommendation. In this chapter, the authors utilize three kinds of approaches-traditional term-based approach, WordNetbased semantic approach, ...
  • Anderson, TK (Information Science Reference, 2008-01)
  • Debenham, JK; Sierra, C (Springer, 2010-01)
    A model of reputation is presented in which agents share and aggregate their opinions, and observe the way in which their opinions effect the opinions of others. A method is proposed that supports the deliberative process ...
  • Coulin, CR; Zowghi, D (Information Science Publishing, 2005-01)
  • Light, A; Anderson, TK (Springer, 2009-01)
    This paper reflects on the relationship between who one designs for and what one designs in the unstructured space of designing for political change; in particular, for supporting "International Development" with ICT. We ...
  • Zhang, Y; Weakley, AJ; Edmonds, EA (Springer, 2007-01)
    This paper extends the knowledge and understanding of art-technology collaboration. It reports upon a close empirical study of how computer programmers interacted with a digital artist to develop a computer-based interactive ...
  • Demong, NA; Lu, J (Springer, 2012-01)
    Investment in the real estate industry is subject to high risk, especially when there are a large number of uncertainty factors in a project. Risk analysis has been widely used to make decisions for real estate investment. ...
  • Deng, C; Gao, X; Li, X; Tao, D (Springer-Verlag Berlin / Heidelberg, 2011-01)
    Abstract. In image watermarking, binding the watermark synchronization with the local features has been widely used to provide robustness against geometric distortions as well as common image processing operations. However, ...
  • Gill, AQ; Bunker, D (IGI, 2013-01)
    The emergence of Software as a Service (SaaS) has made it possible to develop dynamic and complex business processes as eServices. The development of business processes as eServices (SaaS) can be assisted by the means of ...
  • Nanda, P; He, S (IGI Global, 2010-01)
    The evolution of Internet and its successful technologies has brought a tremendous growth in business, education, research etc. over the last four decades. With the dramatic advances in multimedia technologies and the ...
  • Sinha, S; Chaczko, Z; Klempous, R (2009)
    Wireless Sensor Networks (WSN) is fast becoming the holy grail of digital surveillance, data monitoring and analysis. Being relatively cheap, lowpowered and easy to deploy WSNs is being adopted in a range of different ...
  • da Rimini, F (Information Science Reference, 2007-01)
    This publication examines how the use of open source software affects practices in society, business, government, education and law. It provides a balance of theoretical perspectives, experiences and cases in relation to ...
  • Henderson-Sellers, B; Tran, Q; Hawryszkiewycz, IT (IGI Global, 2009-01)
    The use of a situational method engineering approach to create agile methodologies is demonstrated. Although existing method bases are shown to be deficient, we take one of these (that of the OPEN Process Framework) and ...
  • Madden, CS; Madden, CS; Piccardi, M; Piccardi, M; Van Den Hengel, A; Van Den Hengel, A (Springer-Verlag Berlin / HeidelbergSpringer-Verlag Berlin / Heidelberg, 2011-01)
    Tracking the movements of people around surveillance systems is becoming increasingly important in the current security conscious environment. This chapter discusses recent research to assist with tracking the movement of ...