Sciweavers

130 search results - page 13 / 26
» Algorithms for Finding a Most Similar Subforest
Sort
View
CASES
2004
ACM
15 years 1 months ago
Scalable custom instructions identification for instruction-set extensible processors
Extensible processors allow addition of application-specific custom instructions to the core instruction set architecture. However, it is computationally expensive to automaticall...
Pan Yu, Tulika Mitra
SIGMOD
2008
ACM
144views Database» more  SIGMOD 2008»
15 years 9 months ago
Preservation of proximity privacy in publishing numerical sensitive data
We identify proximity breach as a privacy threat specific to numerical sensitive attributes in anonymized data publication. Such breach occurs when an adversary concludes with hig...
Jiexing Li, Yufei Tao, Xiaokui Xiao
CVPR
1999
IEEE
15 years 11 months ago
The Customized-Queries Approach to CBIR Using EM
This paper makes two contributions. The first contribution is an approach called the "customized-queries" approach (CQA) to content-based image retrieval. The second is ...
Jennifer G. Dy, Carla E. Brodley, Avinash C. Kak, ...
BMCBI
2006
87views more  BMCBI 2006»
14 years 9 months ago
Phylogeny based discovery of regulatory elements
Background: Algorithms that locate evolutionarily conserved sequences have become powerful tools for finding functional DNA elements, including transcription factor binding sites;...
Jason Gertz, Justin C. Fay, Barak A. Cohen
97
Voted
CVPR
2008
IEEE
15 years 11 months ago
FusionFlow: Discrete-continuous optimization for optical flow estimation
Accurate estimation of optical flow is a challenging task, which often requires addressing difficult energy optimization problems. To solve them, most top-performing methods rely ...
Victor S. Lempitsky, Stefan Roth, Carsten Rother