Sciweavers

3758 search results - page 143 / 752
» A Complete Subsumption Algorithm
Sort
View
IEAAIE
2009
Springer
15 years 4 months ago
An Efficient Algorithm for Maintaining Frequent Closed Itemsets over Data Stream
Data mining refers to the process of revealing unknown and potentially useful information from a large database. Frequent itemsets mining is one of the foundational problems in dat...
Show-Jane Yen, Yue-Shi Lee, Cheng-Wei Wu, Chin-Lin...
ICASSP
2008
IEEE
15 years 4 months ago
A GIS-like training algorithm for log-linear models with hidden variables
Conditional Random Fields (CRFs) are often estimated using an entropy based criterion in combination with Generalized Iterative Scaling (GIS). GIS offers, upon others, the immedi...
Georg Heigold, Thomas Deselaers, Ralf Schlüte...
ICPR
2008
IEEE
15 years 4 months ago
A novel automatic seed point selection algorithm for breast ultrasound images
Region growing is a frequently used segmentation method for medical ultrasound images processing. The first step of region growing is selecting the seed point which is inside the ...
Juan Shan, Heng-Da Cheng, Yuxuan Wang
TRIDENTCOM
2008
IEEE
15 years 4 months ago
A case study in testing a network security algorithm
Several difficulties arise when testing network security algorithms. First, using network data captured at a router does not guarantee that any instances of the security event of...
Carrie Gates
ICALP
2007
Springer
15 years 4 months ago
Parameterized Algorithms for Directed Maximum Leaf Problems
d Abstract) Noga Alon∗ Fedor V. Fomin† Gregory Gutin‡ Michael Krivelevich§ Saket Saurabh¶ We prove that finding a rooted subtree with at least k leaves in a directed grap...
Noga Alon, Fedor V. Fomin, Gregory Gutin, Michael ...