Sciweavers

2304 search results - page 345 / 461
» On the Vulnerability of Large Graphs
Sort
View
EJC
2011
14 years 1 months ago
A Tutte-style proof of Brylawski's tensor product formula
We provide a new proof of Brylawski’s formula for the Tutte polynomial of the tensor product of two matroids. Our proof involves extending Tutte’s formula, expressing the Tutte...
Yuanan Diao, Gábor Hetyei, Kenneth Hinson
CORR
2012
Springer
188views Education» more  CORR 2012»
13 years 5 months ago
A Logical Characterization of Constraint-Based Causal Discovery
We present a novel approach to constraintbased causal discovery, that takes the form of straightforward logical inference, applied to a list of simple, logical statements about ca...
Tom Claassen, Tom Heskes
IV
2008
IEEE
296views Visualization» more  IV 2008»
15 years 4 months ago
Revealing Subnetwork Roles using Contextual Visualization: Comparison of Metabolic Networks
This article is addressing a recurrent problem in biology: mining newly built large scale networks. Our approach consists in comparing these new networks to well known ones. The v...
Romain Bourqui, Fabien Jourdan
SDM
2011
SIAM
232views Data Mining» more  SDM 2011»
14 years 23 days ago
A Sequential Dual Method for Structural SVMs
In many real world prediction problems the output is a structured object like a sequence or a tree or a graph. Such problems range from natural language processing to computationa...
Shirish Krishnaj Shevade, Balamurugan P., S. Sunda...
ICPR
2000
IEEE
15 years 11 months ago
Comparison of Face Verification Results on the XM2VTS Database
The paper presents results of the face verification contest that was organized in conjunction with International Conference on Pattern Recognition 2000 [14]. Participants had to u...
Jiri Matas, Miroslav Hamouz, Kenneth Jonsson, Jose...