Sciweavers

882 search results - page 176 / 177
» On the Hardness of Graph Isomorphism
Sort
View
JCDL
2011
ACM
272views Education» more  JCDL 2011»
12 years 9 months ago
CollabSeer: a search engine for collaboration discovery
Collaborative research has been increasingly popular and important in academic circles. However, there is no open platform available for scholars or scientists to effectively dis...
Hung-Hsuan Chen, Liang Gou, Xiaolong Zhang, Clyde ...
CCS
2011
ACM
12 years 6 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
ICDAR
2011
IEEE
12 years 5 months ago
Ternary Entropy-Based Binarization of Degraded Document Images Using Morphological Operators
—A vast number of historical and badly degraded document images can be found in libraries, public, and national archives. Due to the complex nature of different artifacts, such p...
T. Hoang Ngan Le, Tien D. Bui, Ching Y. Suen
KDD
2012
ACM
229views Data Mining» more  KDD 2012»
11 years 8 months ago
Finding trendsetters in information networks
Influential people have an important role in the process of information diffusion. However, there are several ways to be influential, for example, to be the most popular or the...
Diego Sáez-Trumper, Giovanni Comarela, Virg...
KDD
2012
ACM
242views Data Mining» more  KDD 2012»
11 years 8 months ago
Query-driven discovery of semantically similar substructures in heterogeneous networks
Heterogeneous information networks that contain multiple types of objects and links are ubiquitous in the real world, such as bibliographic networks, cyber-physical networks, and ...
Xiao Yu, Yizhou Sun, Peixiang Zhao, Jiawei Han