Sciweavers

8655 search results - page 1396 / 1731
» Challenges for Trusted Computing
Sort
View
137
Voted
DKE
2007
105views more  DKE 2007»
15 years 3 months ago
On compressing frequent patterns
A major challenge in frequent-pattern mining is the sheer size of its mining results. To compress the frequent patterns, we propose to cluster frequent patterns with a tightness m...
Dong Xin, Jiawei Han, Xifeng Yan, Hong Cheng
144
Voted
JUCS
2008
143views more  JUCS 2008»
15 years 3 months ago
Defining Tasks, Domains and Conversational Acts in CSCW Systems: the SPACE-DESIGN Case Study
: Most of the current academic and professional work requires collaboration between the members of a working group. Groupware tools play a prevailing role in supporting this collab...
Rafael Duque, Jesús Gallardo, Crescencio Br...
135
Voted
JMLR
2006
103views more  JMLR 2006»
15 years 3 months ago
MinReg: A Scalable Algorithm for Learning Parsimonious Regulatory Networks in Yeast and Mammals
In recent years, there has been a growing interest in applying Bayesian networks and their extensions to reconstruct regulatory networks from gene expression data. Since the gene ...
Dana Pe'er, Amos Tanay, Aviv Regev
100
Voted
JMM2
2006
101views more  JMM2 2006»
15 years 3 months ago
Automatic Detection of Targets Using Center-Surround Difference and Local Thresholding
This paper proposes a new target detection method in low contrast forward looking infrared (FLIR) images. Automatic detection of small targets in remotely sensed images is a diffic...
Sun-Gu Sun, Dong-Min Kwak
150
Voted
JNW
2006
149views more  JNW 2006»
15 years 3 months ago
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes
Mobile ad hoc network (MANET) has been generally regarded as an ideal network model for group communications because of its specialty of instant establishment. However, the securit...
Shidi Xu, Yi Mu, Willy Susilo
« Prev « First page 1396 / 1731 Last » Next »