Sciweavers

4926 search results - page 167 / 986
» Two Graph Algorithms On an Associative Computing Model
Sort
View
ICALP
2009
Springer
16 years 5 months ago
Elimination Graphs
A graph is chordal if it does not contain any induced cycle of size greater than three. An alternative characterization of chordal graphs is via a perfect elimination ordering, whi...
Yuli Ye, Allan Borodin
ICCV
2011
IEEE
14 years 5 months ago
A String of Feature Graphs Model for Recognition of Complex Activities in Natural Videos
Videos usually consist of activities involving interactions between multiple actors, sometimes referred to as complex activities. Recognition of such activities requires modeling ...
Utkarsh Gaur, Yingying Zhu, Bi Song, Amit Roy-Chow...
TACAS
2010
Springer
162views Algorithms» more  TACAS 2010»
16 years 1 days ago
Computing the Leakage of Information-Hiding Systems
We address the problem of computing the information leakage of a system in an efficient way. We propose two methods: one based on reducing the problem to reachability, and the oth...
Miguel E. Andrés, Catuscia Palamidessi, Pet...
CVPR
2011
IEEE
15 years 14 days ago
Modeling Human Activities as Speech
Human activity recognition and speech recognition appear to be two loosely related research areas. However, on a careful thought, there are several analogies between activity and ...
Chia-Chih Chen, Jake Aggarwal
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
16 years 5 months ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé