Sciweavers

2006 search results - page 113 / 402
» Heuristic Security-Testing Methods
Sort
View
95
Voted
WEA
2007
Springer
108views Algorithms» more  WEA 2007»
15 years 6 months ago
Engineering Algorithms for Approximate Weighted Matching
We present a systematic study of approximation algorithms for the maximum weight matching problem. This includes a new algorithm which provides the simple greedy method with a rece...
Jens Maue, Peter Sanders
75
Voted
ICDM
2006
IEEE
89views Data Mining» more  ICDM 2006»
15 years 6 months ago
Plagiarism Detection in arXiv
We describe a large-scale application of methods for finding plagiarism and self-plagiarism in research document collections. The methods are applied to a collection of 284,834 d...
Daria Sorokina, Johannes Gehrke, Simeon Warner, Pa...
ECAI
2004
Springer
15 years 6 months ago
Temporal Plan Interdependencies
Abstract. Asbru is a complex formal language developed to represent clinical guidelines and protocols which are time- and processoriented. To facilitate and support the modeling in...
Katharina Kaiser, Silvia Miksch
EVOW
2006
Springer
15 years 4 months ago
A Multiagent Algorithm for Graph Partitioning
The k-cut problem is an NP-complete problem which consists of finding a partition of a graph into k balanced parts such that the number of cut edges is minimized. Different algori...
Francesc Comellas, Emili Sapena
ACL
2000
15 years 2 months ago
Using Confidence Bands for Parallel Texts Alignment
This paper describes a language independent method for alignment of parallel texts that makes use of homograph tokens for each pair of languages. In order to filter out tokens tha...
António Ribeiro, José Gabriel Pereir...