Sciweavers

738 search results - page 94 / 148
» Prime Implicant Computation Using Satisfiability Algorithms
Sort
View
CORR
2010
Springer
186views Education» more  CORR 2010»
14 years 10 months ago
Significant Interval and Frequent Pattern Discovery in Web Log Data
There is a considerable body of work on sequence mining of Web Log Data We are using One Pass frequent Episode discovery (or FED) algorithm, takes a different approach than the tr...
Kanak Saxena, Rahul Shukla
HICSS
1998
IEEE
97views Biometrics» more  HICSS 1998»
15 years 2 months ago
CAFE: A Conceptual Model for Managing Information in Electronic Mail
The design and implementation of a conceptual model, CAFE (a Categorization Assistant For E-mail), is described. The model supports the organization, searching, and retrieval of i...
Juha Takkinen, Nahid Shahmehri
CVPR
2004
IEEE
15 years 11 months ago
Detecting Unusual Activity in Video
We present an unsupervised technique for detecting unusual activity in a large video set using many simple features. No complex activity models and no supervised feature selection...
Hua Zhong, Jianbo Shi, Mirkó Visontai
COMPGEOM
2010
ACM
15 years 2 months ago
The complexity of the normal surface solution space
Normal surface theory is a central tool in algorithmic threedimensional topology, and the enumeration of vertex normal surfaces is the computational bottleneck in many important a...
Benjamin A. Burton
ASIACRYPT
2008
Springer
14 years 11 months ago
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems
Abstract. The generic (aka. black-box) group model is a valuable methodology for analyzing the computational hardness of number-theoretic problems used in cryptography. Since the p...
Andy Rupp, Gregor Leander, Endre Bangerter, Alexan...