Sciweavers

5344 search results - page 212 / 1069
» Privacy-Preserving Set Operations
Sort
View
PAMI
2011
14 years 10 months ago
Parallel Spectral Clustering in Distributed Systems
Spectral clustering algorithms have been shown to be more effective in finding clusters than some traditional algorithms such as k-means. However, spectral clustering suffers fro...
Wen-Yen Chen, Yangqiu Song, Hongjie Bai, Chih-Jen ...
124
Voted
ICPR
2004
IEEE
16 years 4 months ago
Image Analysis Through Local Information Measures
The properties of local image statistics are analyzed in a classic information theoretic setting. Local spatiochromatic image elements are projected into a space in which constitu...
Neil Bruce
ICDCS
2009
IEEE
16 years 22 days ago
Characterization and Solution to a Stateful IDS Evasion
We identify a new type of stateful IDS evasion, named signature evasion. We formalize the signature evasion on those Stateful IDSs whose state can be modeled using Deterministic F...
Issam Aib, Tung Tran, Raouf Boutaba
109
Voted
SAC
2009
ACM
15 years 10 months ago
Decomposing port automata
Port automata are an operational model for component connectors in a coordination language such as Reo. They describe which sets of ports can synchronize in each state of the conn...
Christian Koehler, Dave Clarke
ESA
2001
Springer
97views Algorithms» more  ESA 2001»
15 years 8 months ago
Splitting a Delaunay Triangulation in Linear Time
Computing the Delaunay triangulation of n points requires usually a minimum of (n log n) operations, but in some special cases where some additional knowledge is provided, faster a...
Bernard Chazelle, Olivier Devillers, Ferran Hurtad...