Sciweavers

1167 search results - page 171 / 234
» Substitution-closed pattern classes
Sort
View
CSE
2009
IEEE
15 years 4 months ago
Social Inference Risk Modeling in Mobile and Social Applications
— The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk resu...
Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mo...
ICDAR
2009
IEEE
15 years 4 months ago
Writer Adaptation for Online Handwriting Recognition System Using Virtual Examples
For an online handwriting recognition system equipped with a writer-independent classifier to progressively improve the recognition performance for a specific writer with an incre...
Hidetoshi Miyao, Minoru Maruyama
ICDM
2009
IEEE
152views Data Mining» more  ICDM 2009»
15 years 4 months ago
SLIDER: Mining Correlated Motifs in Protein-Protein Interaction Networks
Correlated motif mining (CMM) is the problem to find overrepresented pairs of patterns, called motif pairs, in interacting protein sequences. Algorithmic solutions for CMM thereb...
Peter Boyen, Frank Neven, Dries Van Dyck, Aalt-Jan...
ACCV
2009
Springer
15 years 4 months ago
Image-Set Based Face Recognition Using Boosted Global and Local Principal Angles
Face recognition using image-set or video sequence as input tends to be more robust since image-set or video sequence provides much more information than single snapshot about the ...
Xi Li, Kazuhiro Fukui, Nanning Zheng
AIMS
2009
Springer
15 years 4 months ago
Visualization of Node Interaction Dynamics in Network Traces
The analysis of network traces often requires to find the spots where something interesting happens. Since traces are usually very large data-sets, it is often not easy and time i...
Petar Dobrev, Sorin Stancu-Mara, Jürgen Sch&o...