Sciweavers

1511 search results - page 133 / 303
» Hierarchical Graph Transformation
Sort
View
168
Voted
PAMI
2008
197views more  PAMI 2008»
15 years 5 months ago
LEGClust - A Clustering Algorithm Based on Layered Entropic Subgraphs
Hierarchical clustering is a stepwise clustering method usually based on proximity measures between objects or sets of objects from a given data set. The most common proximity meas...
Jorge M. Santos, Joaquim Marques de Sá, Lu&...
148
Voted
ICPR
2004
IEEE
16 years 6 months ago
Graph Based Image Matching
Given two or more images, we can define different but related problems on pattern matching such as image registration, pattern detection and localization, and common pattern disco...
Chong-Wah Ngo, Hui Jiang
133
Voted
ICCS
2005
Springer
15 years 10 months ago
Variables in Concept Graphs
A main feature of many logics used in computer science is a means to express quantification. Usually, syntactical devices like variables and quantifiers are used for this purpose...
Frithjof Dau
GG
2004
Springer
15 years 10 months ago
A Perspective on Graphs and Access Control Models
There would seem to be a natural connection between graphs and information security. This is particularly so in the arena of access control and authorization. Research on applying ...
Ravi S. Sandhu
BIRTHDAY
2010
Springer
15 years 3 months ago
Termination Graphs for Java Bytecode
To prove termination of Java Bytecode (JBC) automatically, we transform JBC to finite termination graphs which represent all possible runs of the program. Afterwards, the graph can...
Marc Brockschmidt, Carsten Otto, Christian von Ess...