Sciweavers

596 search results - page 81 / 120
» Providing Automatic Support for Heuristic Rules of Methods
Sort
View
KDD
2002
ACM
140views Data Mining» more  KDD 2002»
15 years 10 months ago
Mining frequent item sets by opportunistic projection
In this paper, we present a novel algorithm OpportuneProject for mining complete set of frequent item sets by projecting databases to grow a frequent item set tree. Our algorithm ...
Junqiang Liu, Yunhe Pan, Ke Wang, Jiawei Han
ECCV
2000
Springer
15 years 11 months ago
Model-Based Initialisation for Segmentation
The initialisation of segmentation methods aiming at the localisation of biological structures in medical imagery is frequently regarded as a given precondition. In practice, howev...
Christian Brechbühler, Gábor Szé...
QSHINE
2005
IEEE
15 years 3 months ago
Retransmission Strategies for Wireless Connections with Resource-Limited Devices
Protocols designed to provide error-free communications over lossy links, at both data link and transport layers, commonly employ the idea of sliding windows, which is based on th...
Lavy Libman
ANCS
2007
ACM
15 years 1 months ago
On LID assignment in infiniBand networks
To realize a path in an InfiniBand network, an address, known as Local IDentifier (LID) in the InfiniBand specification, must be assigned to the destination and used in the forwar...
Wickus Nienaber, Xin Yuan, Zhenhai Duan
74
Voted
BPM
2006
Springer
93views Business» more  BPM 2006»
15 years 1 months ago
Building Business Process Driven Web Applications
The Internet has turned to be one the most common platform for the development of applications. In addition, sometimes the specification of these applications is given to web devel...
Victoria Torres, Vicente Pelechano