In recent years, various constrained frequent pattern mining problem formulations and associated algorithms have been developed that enable the user to specify various itemsetbase...
153 views135 votes15 years 10 months ago SUTC 2006»
- In this paper, we describe a group key management protocol for hierarchical sensor networks where instead of using pre-deployed keys, each sensor node generates a partial key dyn...
206 views132 votes14 years 11 months ago TCSV 2010»
In this paper, from the viewpoint of scene understanding, a 3-layer Bayesian hierarchical framework (BHF) is proposed for robust vacant parking space detection. In practice, the ch...
182 views166 votes15 years 5 months ago AAAI 2010»
Forming effective coalitions is a major research challenge in AI and multi-agent systems (MAS). Coalition Structure Generation (CSG) involves partitioning a set of agents into coa...
105 views162 votes15 years 4 months ago BMCBI 2007»
Background: In the analysis of networks we frequently require the statistical significance of some network statistic, such as measures of similarity for the properties of interact...
254 views174 votes13 years 6 months ago CVPR 2012»
Objects in scenes interact with each other in complex ways. A key observation is that these interactions manifest themselves as predictable visual patterns in the image. Discoveri...
148 views131 votes15 years 8 months ago DASFAA 2007»
In order to efficiently determine structural relationships among XML elements and to avoid re-labeling for updates, much research about labeling schemes has been conducted, recentl...
186 views148 votes15 years 11 months ago ADMA 2009»
Mining frequent sequential patterns from sequence databases has been a central research topic in data mining and various efficient mining sequential patterns algorithms have been p...
147 views153 votes15 years 8 months ago DATE 1999»
In this paper, new and efficient BIST methodology and BIST hardware insertion algorithms are presented for RTL data paths obtained from high level synthesis. The methodology is ba...
In this paper, we present a broadcast encryption scheme with efficient transmission cost under the log-key restriction. Given n users and r revoked users, our scheme has the trans...