Sciweavers

8669 search results - page 1526 / 1734
» Computing matrix representations
Sort
View
AUSDM
2007
Springer
113views Data Mining» more  AUSDM 2007»
15 years 9 months ago
PCITMiner- Prefix-based Closed Induced Tree Miner for finding closed induced frequent subtrees
Frequent subtree mining has attracted a great deal of interest among the researchers due to its application in a wide variety of domains. Some of the domains include bio informati...
Sangeetha Kutty, Richi Nayak, Yuefeng Li
CALCO
2007
Springer
95views Mathematics» more  CALCO 2007»
15 years 9 months ago
Higher Dimensional Trees, Algebraically
In formal language theory, James Rogers published a series of innovative papers generalising strings and trees to higher dimensions.Motivated by applications in linguistics, his go...
Neil Ghani, Alexander Kurz
CCS
2007
ACM
15 years 9 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
CIVR
2007
Springer
361views Image Analysis» more  CIVR 2007»
15 years 9 months ago
Interpretability based interest points detection
This paper deals with a new interest points detector. Unlike most standard detectors which concentrate on the local shape of the signal, the main objective of this new operator is...
Ahmed Rebai, Alexis Joly, Nozha Boujemaa
COST
2007
Springer
118views Multimedia» more  COST 2007»
15 years 9 months ago
The Organization of a Neurocomputational Control Model for Articulatory Speech Synthesis
The organization of a computational control model of articulatory speech synthesis is outlined in this paper. The model is based on general principles of neurophysiology and cognit...
Bernd J. Kröger, Anja Lowit, Ralph Schnitker
« Prev « First page 1526 / 1734 Last » Next »