Sciweavers

2152 search results - page 285 / 431
» A Comparative Study of 2QBF Algorithms
Sort
View
KDD
2007
ACM
179views Data Mining» more  KDD 2007»
15 years 11 months ago
Mining statistically important equivalence classes and delta-discriminative emerging patterns
The support-confidence framework is the most common measure used in itemset mining algorithms, for its antimonotonicity that effectively simplifies the search lattice. This com...
Jinyan Li, Guimei Liu, Limsoon Wong
SI3D
2009
ACM
15 years 12 months ago
Perceptually consistent example-based human motion retrieval
Large amount of human motion capture data have been increasingly recorded and used in animation and gaming applications. Efficient retrieval of logically similar motions from a l...
Zhigang Deng, Qin Gu, Qing Li
126
Voted
ISPEC
2005
Springer
15 years 10 months ago
Robust Routing in Malicious Environment for Ad Hoc Networks
Abstract. Secure routing in ad hoc networks has been extensively studied in recent years. The vast majority of this work, however, has only focused on providing authenticity of the...
Zhongchao Yu, Chuk-Yang Seng, Tao Jiang, Xue Wu, W...
130
Voted
FCCM
2000
IEEE
148views VLSI» more  FCCM 2000»
15 years 9 months ago
An Adaptive Cryptographic Engine for IPSec Architectures
Architectures that implement the Internet Protocol Security (IPSec) standard have to meet the enormous computing demands of cryptographic algorithms. In addition, IPSec architectu...
Andreas Dandalis, Viktor K. Prasanna, José ...
152
Voted
IMSCCS
2006
IEEE
15 years 11 months ago
Clustering of Gene Expression Data: Performance and Similarity Analysis
Background: DNA Microarray technology is an innovative methodology in experimental molecular biology, which has produced huge amounts of valuable data in the profile of gene expre...
Longde Yin, Chun-Hsi Huang