Sciweavers

5344 search results - page 185 / 1069
» Privacy-Preserving Set Operations
Sort
View
ORDER
2011
14 years 10 months ago
Order Types of Convex Bodies
We prove a Hadwiger transversal type result, characterizing convex position on a family of non-crossing convex bodies in the plane. This theorem suggests a definition for the ord...
Alfredo Hubard, Luis Montejano, Emiliano Mora, And...
120
Voted
ORL
2011
14 years 10 months ago
Solving large Steiner Triple Covering Problems
Computing the 1-width of the incidence matrix of a Steiner Triple System gives rise to small set covering instances that provide a computational challenge for integer programming ...
James Ostrowski, Jeff Linderoth, Fabrizio Rossi, S...
118
Voted
COMPSAC
2008
IEEE
15 years 10 months ago
Mutation-Based Testing of Buffer Overflow Vulnerabilities
Buffer overflow (BOF) is one of the major vulnerabilities that leads to non-secure software. Testing an implementation for BOF vulnerabilities is challenging as the underlying rea...
Hossain Shahriar, Mohammad Zulkernine
DEXA
2003
Springer
193views Database» more  DEXA 2003»
15 years 8 months ago
Supporting KDD Applications by the k-Nearest Neighbor Join
Abstract. The similarity join has become an important database primitive to support similarity search and data mining. A similarity join combines two sets of complex objects such t...
Christian Böhm, Florian Krebs
ICDM
2002
IEEE
163views Data Mining» more  ICDM 2002»
15 years 8 months ago
High Performance Data Mining Using the Nearest Neighbor Join
The similarity join has become an important database primitive to support similarity search and data mining. A similarity join combines two sets of complex objects such that the r...
Christian Böhm, Florian Krebs