Sciweavers

94 search results - page 16 / 19
» An Empirical Analysis of Pattern Scan Order in Pattern Match...
Sort
View
AUSDM
2007
Springer
113views Data Mining» more  AUSDM 2007»
14 years 16 days ago
PCITMiner- Prefix-based Closed Induced Tree Miner for finding closed induced frequent subtrees
Frequent subtree mining has attracted a great deal of interest among the researchers due to its application in a wide variety of domains. Some of the domains include bio informati...
Sangeetha Kutty, Richi Nayak, Yuefeng Li
WACC
1999
ACM
13 years 10 months ago
Metaphorical representation in collaborative software engineering
a useful abstract representation is fundamental to solving many difficult problems in software engineering. In order to better understand how representations are actually used in ...
James D. Herbsleb
ISCI
2008
137views more  ISCI 2008»
13 years 6 months ago
Stochastic dominance-based rough set model for ordinal classification
In order to discover interesting patterns and dependencies in data, an approach based on rough set theory can be used. In particular, Dominance-based Rough Set Approach (DRSA) has...
Wojciech Kotlowski, Krzysztof Dembczynski, Salvato...
JGS
2010
105views more  JGS 2010»
13 years 4 months ago
Testing for spatial association of qualitative data using symbolic dynamics
Qualitative spatial variables are important in many fields of research. However, unlike the decades-worth of research devoted to the spatial association of quantitative variables, ...
Manuel Ruiz, Fernando López, Antonio P&aacu...
PAMI
2007
127views more  PAMI 2007»
13 years 5 months ago
Text-Independent Writer Identification and Verification Using Textural and Allographic Features
—The identification of a person on the basis of scanned images of handwriting is a useful biometric modality with application in forensic and historic document analysis and const...
Marius Bulacu, Lambert Schomaker