Sciweavers

1132 search results - page 157 / 227
» Similarity Graphs
Sort
View
TKDE
2008
121views more  TKDE 2008»
14 years 9 months ago
Schema Matching Using Interattribute Dependencies
Schema matching is one of the key challenges in information integration. It is a labor-intensive and time-consuming process. To alleviate the problem, many automated solutions have...
Jaewoo Kang, Jeffrey F. Naughton
TOG
2008
107views more  TOG 2008»
14 years 9 months ago
Multiscale texture synthesis
Example-based texture synthesis algorithms have gained widespread popularity for their ability to take a single input image and create a perceptually similar non-periodic texture....
Charles Han, Eric Risser, Ravi Ramamoorthi, Eitan ...
DMIN
2009
222views Data Mining» more  DMIN 2009»
14 years 7 months ago
P-Sensitive K-Anonymity for Social Networks
-- The proliferation of social networks, where individuals share private information, has caused, in the last few years, a growth in the volume of sensitive data being stored in th...
Roy Ford, Traian Marius Truta, Alina Campan
CORR
2010
Springer
162views Education» more  CORR 2010»
14 years 6 months ago
Cross-Composition: A New Technique for Kernelization Lower Bounds
We introduce a new technique for proving kernelization lower bounds, called cross-composition. A classical problem L cross-composes into a parameterized problem Q if an instance o...
Hans L. Bodlaender, Bart M. P. Jansen, Stefan Krat...
CAV
2011
Springer
216views Hardware» more  CAV 2011»
14 years 1 months ago
Malware Analysis with Tree Automata Inference
Abstract. The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors ...
Domagoj Babic, Daniel Reynaud, Dawn Song