Sciweavers

2131 search results - page 92 / 427
» Immunity for Closed Sets
Sort
View
142
Voted
KDD
2000
ACM
118views Data Mining» more  KDD 2000»
15 years 4 months ago
Generating non-redundant association rules
The traditional association rule mining framework produces many redundant rules. The extent of redundancy is a lot larger than previously suspected. We present a new framework for...
Mohammed Javeed Zaki
CDC
2008
IEEE
137views Control Systems» more  CDC 2008»
15 years 3 months ago
Simple coding for achieving mean square stability over bit-rate limited channels
The problem of characterizing lower bounds on data-rates needed for closed loop stability has been solved in a variety of settings. However, the available results lead to coding s...
Eduardo I. Silva, Milan S. Derpich, Jan Øst...
113
Voted
VMV
2001
105views Visualization» more  VMV 2001»
15 years 2 months ago
Facial Reconstruction Using Volumetric Data
In this paper we demonstrate computer aided techniques in the area of the reconstruction of facial features from skeletal remains. We outline the desired features of a system for ...
Mark W. Jones
114
Voted
GISCIENCE
2008
Springer
115views GIS» more  GISCIENCE 2008»
15 years 2 months ago
Validation and Storage of Polyhedra through Constrained Delaunay Tetrahedralization
Abstract. Closed, watertight, 3D geometries are represented by polyhedra. Current data models define these polyhedra basically as a set of polygons, leaving the test on intersectin...
Edward Verbree, Hang Si
110
Voted
COMGEO
2010
ACM
15 years 1 months ago
Centerpoints and Tverberg's technique
Using a technique that Tverberg and Vrecica [TV93] discovered to give a surprisingly simple proof of Tverberg's theorem, we show the following extension of the centerpoint th...
Abdul Basit, Nabil H. Mustafa, Saurabh Ray, Sarfra...