A comparison of techniques for name matching
Peng, T., Li, L., & Kennedy, J. (2012)
A comparison of techniques for name matching. GSTF journal on computing, 2,
Information explosion is a problem for everyone nowadays. It is a great challenge to all kinds of businesses to maintain high quality of data in their information applications...
The VoIP intrusion detection through a LVQ-based neural network.
Presentation / Conference
Zheng, L., & Peng, T. (2009, November)
The VoIP intrusion detection through a LVQ-based neural network. Paper presented at The 4th International Conference for Internet Technology and Secured Transactions, London, UK
Being a fast-growing Internet application, Voice over Internet Protocol shares the network resources with the regular Internet traffic. However it is susceptible to the existi...
A framework for data cleaning in data warehouses
Peng, T. (2008)
A framework for data cleaning in data warehouses. Enterprise Information Systems, 473-478
It is a persistent challenge to achieve a high quality of data in data warehouses. Data cleaning is a crucial task for such a challenge. To deal with this challenge, a set of ...
A discrete formalism for reasoning about action and change
Knight, B., Ma, J., & Peng, T. (1996)
A discrete formalism for reasoning about action and change. In R. Adey, G. Rzevski, & R. Teti (Eds.), Applications of artificial intelligence in engineering XIIdoi:10.2495/AI970101
No abstract available.