Sciweavers

3072 search results - page 159 / 615
» Shape analysis algorithm based on information theory
Sort
View
CAISE
2004
Springer
15 years 3 months ago
Goal-Driven Analysis of Process Model Validity
Business process modeling and design, which has attracted much attention in recent years, emphasizes mainly graphical representation, usually without an underlying theory. The lack...
Pnina Soffer, Yair Wand
DATAMINE
2010
175views more  DATAMINE 2010»
14 years 10 months ago
Extracting influential nodes on a social network for information diffusion
We address the combinatorial optimization problem of finding the most influential nodes on a large-scale social network for two widely-used fundamental stochastic diffusion models...
Masahiro Kimura, Kazumi Saito, Ryohei Nakano, Hiro...
DAC
2004
ACM
15 years 11 months ago
STAC: statistical timing analysis with correlation
Current technology trends have led to the growing impact of both inter-die and intra-die process variations on circuit performance. While it is imperative to model parameter varia...
Jiayong Le, Xin Li, Lawrence T. Pileggi
ICPR
2008
IEEE
15 years 4 months ago
Segmentation of overlapping/aggregating nuclei cells in biological images
This paper presents a method of overlapping/aggregating nuclei cells segmentation. This method is based on the watershed segmentation algorithm, but the specificity of this work i...
Florence Cloppet, Arnaud Boucher
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 4 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang