Sciweavers

901 search results - page 115 / 181
» On Anonymization of String Data
Sort
View
DASFAA
2005
IEEE
191views Database» more  DASFAA 2005»
15 years 7 months ago
An Efficient Approach to Extracting Approximate Repeating Patterns in Music Databases
Pattern extraction from music strings is an important problem. The patterns extracted from music strings can be used as features for music retrieval or analysis. Previous works on ...
Ning-Han Liu, Yi-Hung Wu, Arbee L. P. Chen
IEEEMSP
2002
IEEE
118views Multimedia» more  IEEEMSP 2002»
15 years 6 months ago
Similarity matching of continuous melody contours for humming querying of melody databases
Music query-by-humming is a challenging problem since the humming query inevitably contains much variation and inaccuracy. Many of the previous methods, which adopt note segmentat...
Yongwei Zhu, Mohan S. Kankanhalli, Qi Tian
SPIRE
2001
Springer
15 years 5 months ago
Speed-up of Aho-Corasick Pattern Matching Machines by Rearranging States
Thispaper describes speed-up of string pattern matchingby rearrangingstates inAho-Corasickpattern matching machine, which is a kind of afinite automaton. Werealized speed-up of st...
T. Nishimura, Shuichi Fukamachi, Takeshi Shinohara
CIKM
2009
Springer
15 years 5 months ago
Suffix trees for very large genomic sequences
A suffix tree is a fundamental data structure for string searching algorithms. Unfortunately, when it comes to the use of suffix trees in real-life applications, the current metho...
Marina Barsky, Ulrike Stege, Alex Thomo, Chris Upt...
ACSAC
2004
IEEE
15 years 5 months ago
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing
Host security is achieved by securing both the operating system kernel and the privileged applications that run on top of it. Application-level bugs are more frequent than kernel-...
Jingyu Zhou, Giovanni Vigna