Sciweavers

12265 search results - page 173 / 2453
» Knuth-Morris-Pratt Algorithm: An Analysis
Sort
View
101
Voted
TCBB
2010
106views more  TCBB 2010»
14 years 5 months ago
Quantifying the Degree of Self-Nestedness of Trees: Application to the Structural Analysis of Plants
In this paper we are interested in the problem of approximating trees by trees with a particular self-nested structure. Self-nested trees are such that all their subtrees of a give...
Christophe Godin, Pascal Ferraro
86
Voted
TISSEC
2010
142views more  TISSEC 2010»
14 years 5 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
SAC
2011
ACM
14 years 1 months ago
ImageAlert: credibility analysis of text-image pairs on the web
Although the Web lets users freely browse and publish information, most Web information is unauthorized in contrast to conventional mass media. Therefore, it is not always credibl...
Yusuke Yamamoto, Katsumi Tanaka
ICCV
2011
IEEE
13 years 10 months ago
Localized Principal Component Analysis based Curve Evolution: A Divide and Conquer Approach
We propose a novel localized principal component analysis (PCA) based curve evolution approach which evolves the segmenting curve semi-locally within various target regions (divis...
Vikram Appia, Balaji Ganapathy, Tracy Faber, Antho...
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
13 years 20 days ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...