Sciweavers

722 search results - page 41 / 73
» Efficient Generation of Prime Numbers
Sort
View
126 views 138 votes 16 years 4 months ago  KDD 2004»
In recent years, various constrained frequent pattern mining problem formulations and associated algorithms have been developed that enable the user to specify various itemsetbase...
153 views 135 votes 15 years 10 months ago  SUTC 2006»
- In this paper, we describe a group key management protocol for hierarchical sensor networks where instead of using pre-deployed keys, each sensor node generates a partial key dyn...
206 views 132 votes 14 years 11 months ago  TCSV 2010»
In this paper, from the viewpoint of scene understanding, a 3-layer Bayesian hierarchical framework (BHF) is proposed for robust vacant parking space detection. In practice, the ch...
182 views 166 votes 15 years 5 months ago  AAAI 2010»
Forming effective coalitions is a major research challenge in AI and multi-agent systems (MAS). Coalition Structure Generation (CSG) involves partitioning a set of agents into coa...
105 views 162 votes 15 years 4 months ago  BMCBI 2007»
Background: In the analysis of networks we frequently require the statistical significance of some network statistic, such as measures of similarity for the properties of interact...
254 views 174 votes 13 years 6 months ago  CVPR 2012»
Objects in scenes interact with each other in complex ways. A key observation is that these interactions manifest themselves as predictable visual patterns in the image. Discoveri...
148 views 131 votes 15 years 8 months ago  DASFAA 2007»
In order to efficiently determine structural relationships among XML elements and to avoid re-labeling for updates, much research about labeling schemes has been conducted, recentl...
186 views 148 votes 15 years 11 months ago  ADMA 2009»
Mining frequent sequential patterns from sequence databases has been a central research topic in data mining and various efficient mining sequential patterns algorithms have been p...
147 views 153 votes 15 years 8 months ago  DATE 1999»
In this paper, new and efficient BIST methodology and BIST hardware insertion algorithms are presented for RTL data paths obtained from high level synthesis. The methodology is ba...
107 views 124 votes 15 years 8 months ago  FC 2006»
In this paper, we present a broadcast encryption scheme with efficient transmission cost under the log-key restriction. Given n users and r revoked users, our scheme has the trans...