Sciweavers

1024 search results - page 148 / 205
» Value complete, column complete, predicate complete
Sort
View
AUSDM
2008
Springer
235views Data Mining» more  AUSDM 2008»
15 years 1 months ago
ShrFP-Tree: An Efficient Tree Structure for Mining Share-Frequent Patterns
Share-frequent pattern mining discovers more useful and realistic knowledge from database compared to the traditional frequent pattern mining by considering the non-binary frequen...
Chowdhury Farhan Ahmed, Syed Khairuzzaman Tanbeer,...
CASES
2008
ACM
15 years 1 months ago
Control flow optimization in loops using interval analysis
We present a novel loop transformation technique, particularly well suited for optimizing embedded compilers, where an increase in compilation time is acceptable in exchange for s...
Mohammad Ali Ghodrat, Tony Givargis, Alex Nicolau
EDUTAINMENT
2008
Springer
15 years 1 months ago
Reconstruction of Tree Crown Shape from Scanned Data
Reconstruction of a real tree from scattered scanned points is a new challenge in virtual reality. Although many progresses are made on main branch structures and overall shape of ...
Chao Zhu, Xiaopeng Zhang, Bao-Gang Hu, Marc Jaeger
ESA
2008
Springer
134views Algorithms» more  ESA 2008»
15 years 1 months ago
Improved Randomized Results for That Interval Selection Problem
Online interval selection is a problem in which intervals arrive one by one, sorted by their left endpoints. Each interval has a length and a non-negative weight associated with i...
Leah Epstein, Asaf Levin
FSE
2008
Springer
103views Cryptology» more  FSE 2008»
15 years 1 months ago
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
Consider the permutation S in RC4. Roos pointed out in 1995 that after the Key Scheduling Algorithm (KSA) of RC4, each of the initial bytes of the permutation, i.e., S[y] for smal...
Subhamoy Maitra, Goutam Paul