Sciweavers

2006 search results - page 303 / 402
» Heuristic Security-Testing Methods
Sort
View
185
Voted
ICDE
2006
IEEE
196views Database» more  ICDE 2006»
16 years 2 months ago
Closure-Tree: An Index Structure for Graph Queries
Graphs have become popular for modeling structured data. As a result, graph queries are becoming common and graph indexing has come to play an essential role in query processing. ...
Huahai He, Ambuj K. Singh
198
Voted
ICDE
2002
IEEE
106views Database» more  ICDE 2002»
16 years 2 months ago
OSSM: A Segmentation Approach to Optimize Frequency Counting
Computing the frequency of a pattern is one of the key operations in data mining algorithms. We describe a simple yet powerful way of speeding up any form of frequency counting sa...
Carson Kai-Sang Leung, Raymond T. Ng, Heikki Manni...
ICPR
2006
IEEE
16 years 1 months ago
Finding Rule Groups to Classify High Dimensional Gene Expression Datasets
Microarray data provides quantitative information about the transcription profile of cells. To analyze microarray datasets, methodology of machine learning has increasingly attrac...
Jiyuan An, Yi-Ping Phoebe Chen
102
Voted
ICPR
2006
IEEE
16 years 1 months ago
Five-Point Motion Estimation Made Easy
Estimating relative camera motion from two views is a classical problem in computer vision. The minimal case for such problem is the so-called five-point-problem, for which the st...
Hongdong Li, Richard I. Hartley
91
Voted
ICPR
2000
IEEE
16 years 1 months ago
Stability Analysis of Medial Axis Transform under Relative Hausdorff Distance
Medial axis transform (MAT) is a basic tool for shape analysis. But, in spite of its usefulness, it has some drawbacks, one of which is its instability under the boundary perturba...
Sung Woo Choi, Seong-Whan Lee