Sciweavers

263 search results - page 25 / 53
» On the Containment of Forbidden Patterns Problems
Sort
View
SSPR
2004
Springer
15 years 5 months ago
Clustering Variable Length Sequences by Eigenvector Decomposition Using HMM
We present a novel clustering method using HMM parameter space and eigenvector decomposition. Unlike the existing methods, our algorithm can cluster both constant and variable leng...
Fatih Murat Porikli
LREC
2010
309views Education» more  LREC 2010»
15 years 1 months ago
Comment Extraction from Blog Posts and Its Applications to Opinion Mining
Blog posts containing many personal experiences or perspectives toward specific subjects are useful. Blogs allow readers to interact with bloggers by placing comments on specific ...
Huan-An Kao, Hsin-Hsi Chen
JGAA
2007
135views more  JGAA 2007»
14 years 11 months ago
Challenging Complexity of Maximum Common Subgraph Detection Algorithms: A Performance Analysis of Three Algorithms on a Wide Dat
Graphs are an extremely general and powerful data structure. In pattern recognition and computer vision, graphs are used to represent patterns to be recognized or classified. Det...
Donatello Conte, Pasquale Foggia, Mario Vento
ICC
2009
IEEE
132views Communications» more  ICC 2009»
15 years 6 months ago
Preprocessing DNS Log Data for Effective Data Mining
—The Domain Name Service (DNS) provides a critical function in directing Internet traffic. Defending DNS servers from bandwidth attacks is assisted by the ability to effectively...
Mark E. Snyder, Ravi Sundaram, Mayur Thakur
AGILE
2009
Springer
210views GIS» more  AGILE 2009»
15 years 6 months ago
Detecting Hotspots in Geographic Networks
We study a point pattern detection problem on networks, motivated by geographical analysis tasks, such as crime hotspot detection. Given a network N (for example, a street, train,...
Kevin Buchin, Sergio Cabello, Joachim Gudmundsson,...