Sciweavers

2304 search results - page 340 / 461
» On the Vulnerability of Large Graphs
Sort
View
CASCON
2003
89views Education» more  CASCON 2003»
14 years 11 months ago
Removing false code dependencies to speedup software build processes
The development of large software systems involves a continual lengthy build process that may include preprocessing, compilation and linking of tens of thousands of source code ï¬...
Yijun Yu, Homayoun Dayani-Fard, John Mylopoulos
NIPS
2004
14 years 11 months ago
Validity Estimates for Loopy Belief Propagation on Binary Real-world Networks
We introduce a computationally efficient method to estimate the validity of the BP method as a function of graph topology, the connectivity strength, frustration and network size....
Joris M. Mooij, Hilbert J. Kappen
NIPS
2004
14 years 11 months ago
Efficient Out-of-Sample Extension of Dominant-Set Clusters
Dominant sets are a new graph-theoretic concept that has proven to be relevant in pairwise data clustering problems, such as image segmentation. They generalize the notion of a ma...
Massimiliano Pavan, Marcello Pelillo
SDM
2004
SIAM
163views Data Mining» more  SDM 2004»
14 years 11 months ago
Basic Association Rules
Previous approaches for mining association rules generate large sets of association rules. Such sets are difficult for users to understand and manage. Here, the concept of a restri...
Guichong Li, Howard J. Hamilton
AAAI
1998
14 years 11 months ago
Which Search Problems Are Random?
The typical difficulty of various NP-hard problems varies with simple parameters describing their structure. This behavior is largely independent of the search algorithm, but depe...
Tad Hogg