Sciweavers

2681 search results - page 226 / 537
» Problem F
Sort
View
KDD
2008
ACM
146views Data Mining» more  KDD 2008»
16 years 1 months ago
Constraint programming for itemset mining
The relationship between constraint-based mining and constraint programming is explored by showing how the typical constraints used in pattern mining can be formulated for use in ...
Luc De Raedt, Tias Guns, Siegfried Nijssen
112
Voted
CCS
2006
ACM
15 years 4 months ago
Cryptanalysis of the "Grain" family of stream ciphers
Let us have an NLFSR with the feedback function g(x) and an LFSR with the generating polynomial f(x). The function g(x) is a Boolean function on the state of the NLFSR and the LFS...
Alexander Maximov
105
Voted
GLOBECOM
2006
IEEE
15 years 6 months ago
Distributed Formation of Overlapping Multi-hop Clusters in Wireless Sensor Networks
– Clustering is a standard approach for achieving efficient and scalable performance in wireless sensor networks. Most of the published clustering algorithms strive to generate t...
Adel M. Youssef, Mohamed F. Younis, Moustafa Youss...
125
Voted
PAAMS
2010
Springer
14 years 10 months ago
A Case Study on Grammatical-Based Representation for Regular Expression Evolution
Abstract. Regular expressions, or simply regex, have been widely used as a powerful pattern matching and text extractor tool through decades. Although they provide a powerful and f...
Antonio González-Pardo, David F. Barrero, D...
100
Voted
AR
2010
149views more  AR 2010»
15 years 27 days ago
Laparoscopic Surgical Robot for Remote In Vivo Training
This paper introduces the Laparobot, a tele-operated surgical robot designed specifically for training surgeons in advanced laparoscopic techniques. The Laparobot allows a student...
Brian F. Allen, Brett Jordan, William Pannell, Cat...