Sciweavers

3604 search results - page 73 / 721
» All Common Subsequences
Sort
View
155
Voted
KDD
2005
ACM
122views Data Mining» more  KDD 2005»
16 years 4 months ago
Pattern lattice traversal by selective jumps
Regardless of the frequent patterns to discover, either the full frequent patterns or the condensed ones, either closed or maximal, the strategy always includes the traversal of t...
Osmar R. Zaïane, Mohammad El-Hajj
129
Voted
EDBT
2006
ACM
150views Database» more  EDBT 2006»
16 years 3 months ago
Improving the Efficiency of XPath Execution on Relational Systems
: This work describes a method for processing XPath on a relational back-end that significantly limits the number of SQL joins required, takes advantage of the strengths of modern ...
Haris Georgiadis, Vasilis Vassalos
110
Voted
CVPR
2010
IEEE
16 years 9 hour ago
Removing Rolling Shutter Wobble
We present an algorithm to remove wobble artifacts from a video captured with a rolling shutter camera undergoing large accelerations or jitter. We show how estimating the rapid m...
Simon Baker, Eric Bennett, Sing Bing Kang, Richard...
90
Voted
ICPR
2008
IEEE
15 years 10 months ago
Multitask learning for EEG-based biometrics
Biometrics based on electroencephalogram (EEG) signals is an emerging research topic. Several recent results have shown its feasibility and potential for personal identification....
Shiliang Sun
92
Voted
VTC
2008
IEEE
110views Communications» more  VTC 2008»
15 years 10 months ago
FFT Sign Search with Secondary Code Constraints for GNSS Signal Acquisition
— New GNSS signals are usually characterized by the presence of secondary codes and high data rates that can make the sign of the transmitted signal change each primary code peri...
Daniele Borio