Sciweavers

738 search results - page 94 / 148
» Prime Implicant Computation Using Satisfiability Algorithms
Sort
View
CORR
2010
Springer
186views Education» more  CORR 2010»
15 years 1 months ago
Significant Interval and Frequent Pattern Discovery in Web Log Data
There is a considerable body of work on sequence mining of Web Log Data We are using One Pass frequent Episode discovery (or FED) algorithm, takes a different approach than the tr...
Kanak Saxena, Rahul Shukla
HICSS
1998
IEEE
97views Biometrics» more  HICSS 1998»
15 years 5 months ago
CAFE: A Conceptual Model for Managing Information in Electronic Mail
The design and implementation of a conceptual model, CAFE (a Categorization Assistant For E-mail), is described. The model supports the organization, searching, and retrieval of i...
Juha Takkinen, Nahid Shahmehri
CVPR
2004
IEEE
16 years 3 months ago
Detecting Unusual Activity in Video
We present an unsupervised technique for detecting unusual activity in a large video set using many simple features. No complex activity models and no supervised feature selection...
Hua Zhong, Jianbo Shi, Mirkó Visontai
COMPGEOM
2010
ACM
15 years 5 months ago
The complexity of the normal surface solution space
Normal surface theory is a central tool in algorithmic threedimensional topology, and the enumeration of vertex normal surfaces is the computational bottleneck in many important a...
Benjamin A. Burton
ASIACRYPT
2008
Springer
15 years 3 months ago
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems
Abstract. The generic (aka. black-box) group model is a valuable methodology for analyzing the computational hardness of number-theoretic problems used in cryptography. Since the p...
Andy Rupp, Gregor Leander, Endre Bangerter, Alexan...