Sciweavers

1082 search results - page 143 / 217
» Graph Mining using Graph Pattern Profiles
Sort
View
110
Voted
SIGMOD
2010
ACM
274views Database» more  SIGMOD 2010»
15 years 7 months ago
K-isomorphism: privacy preserving network publication against structural attacks
Serious concerns on privacy protection in social networks have been raised in recent years; however, research in this area is still in its infancy. The problem is challenging due ...
James Cheng, Ada Wai-Chee Fu, Jia Liu
147
Voted
APBC
2004
164views Bioinformatics» more  APBC 2004»
15 years 3 months ago
Cluster Ensemble and Its Applications in Gene Expression Analysis
Huge amount of gene expression data have been generated as a result of the human genomic project. Clustering has been used extensively in mining these gene expression data to find...
Xiaohua Hu, Illhoi Yoo
CVPR
2010
IEEE
15 years 13 days ago
Common visual pattern discovery via spatially coherent correspondences
We investigate how to discover all common visual patterns within two sets of feature points. Common visual patterns generally share similar local features as well as similar spati...
Hairong Liu, Shuicheng Yan
108
Voted
ICCAD
2008
IEEE
141views Hardware» more  ICCAD 2008»
15 years 11 months ago
Layout decomposition for double patterning lithography
In double patterning lithography (DPL) layout decomposition for 45nm and below process nodes, two features must be assigned opposite colors (corresponding to different exposures)...
Andrew B. Kahng, Chul-Hong Park, Xu Xu, Hailong Ya...
FLAIRS
2009
15 years 6 days ago
Discovering Anomalies to Multiple Normative Patterns in Structural and Numeric Data
One of the primary issues with traditional anomaly detection approaches is their inability to handle complex, structural data. One approach to this issue involves the detection of...
William Eberle, Lawrence B. Holder