Sciweavers

4926 search results - page 585 / 986
» Two Graph Algorithms On an Associative Computing Model
Sort
View
DIS
2003
Springer
15 years 8 months ago
Extraction of Coverings as Monotone DNF Formulas
Abstract. In this paper, we extend monotone monomials as large itemsets in association rule mining to monotone DNF formulas. First, we introduce not only the minimum support but al...
Kouichi Hirata, Ryosuke Nagazumi, Masateru Harao
SIGGRAPH
1998
ACM
15 years 7 months ago
A Multiscale Model of Adaptation and Spatial Vision for Realistic Image Display
In this paper we develop a computational model of adaptation and spatial vision for realistic tone reproduction. The model is based on a multiscale representation of pattern, lumi...
Sumanta N. Pattanaik, James A. Ferwerda, Mark D. F...
INTERWORKING
2000
15 years 6 months ago
Design of a Multi-layer Bandwidth Broker Architecture
Internet is widely known for lacking any kind of mechanism for the provisioning of Quality of Service guarantees. The Internet community concentrates its efforts on the Bandwidth ...
George A. Politis, Petros Sampatakos, Iakovos S. V...
GCB
2008
Springer
174views Biometrics» more  GCB 2008»
15 years 4 months ago
Lightweight Comparison of RNAs based on Exact Sequence-structure Matches
: Specific functions of RNA molecules are often associated with different motifs in the RNA structure. The key feature that forms such an RNA motif is the combination of sequence ...
Steffen Heyne, Sebastian Will, Michael Beckstette,...
SACMAT
2004
ACM
15 years 8 months ago
A role-based approach to access control for XML databases
In order to provide a general access control methodology for parts of XML documents, we propose combining rolebased access control as found in the Role Graph Model, with a methodo...
Jingzhu Wang, Sylvia L. Osborn