Sciweavers

1321 search results - page 135 / 265
» Quadratic forms on graphs
Sort
View
SISAP
2009
IEEE
149views Data Mining» more  SISAP 2009»
15 years 7 months ago
Combinatorial Framework for Similarity Search
—We present an overview of the combinatorial framework for similarity search. An algorithm is combinatorial if only direct comparisons between two pairwise similarity values are ...
Yury Lifshits
CVPR
2005
IEEE
16 years 2 months ago
Object Detection Using 2D Spatial Ordering Constraints
Object detection is challenging partly due to the limited discriminative power of local feature descriptors. We amend this limitation by incorporating spatial constraints among ne...
Yan Li, Yanghai Tsin, Yakup Genc, Takeo Kanade
84
Voted
CAV
2009
Springer
181views Hardware» more  CAV 2009»
16 years 1 months ago
Size-Change Termination, Monotonicity Constraints and Ranking Functions
Abstract. Size-change termination involves deducing program termination based on the impossibility of infinite descent. To this end we may use m abstraction in which transitions ar...
Amir M. Ben-Amram
103
Voted
KDD
2006
ACM
122views Data Mining» more  KDD 2006»
16 years 1 months ago
Measuring and extracting proximity in networks
Measuring distance or some other form of proximity between objects is a standard data mining tool. Connection subgraphs were recently proposed as a way to demonstrate proximity be...
Yehuda Koren, Stephen C. North, Chris Volinsky
112
Voted
ACSAC
2005
IEEE
15 years 6 months ago
A Host-Based Approach to Network Attack Chaining Analysis
The typical means by which an attacker breaks into a network is through a chain of exploits, where each exploit in the chain lays the groundwork for subsequent exploits. Such a ch...
Paul Ammann, Joseph Pamula, Julie A. Street, Ronal...