Sciweavers

2593 search results - page 463 / 519
» Algorithms and Data Structures for Computer Topology
Sort
View
PAKDD
2009
ACM
120views Data Mining» more  PAKDD 2009»
14 years 6 months ago
Detecting Link Hijacking by Web Spammers.
Abstract. Since current search engines employ link-based ranking algorithms as an important tool to decide a ranking of sites, Web spammers are making a significant effort to man...
Masaru Kitsuregawa, Masashi Toyoda, Young-joo Chun...
ICSE
2009
IEEE-ACM
14 years 3 months ago
WISE: Automated test generation for worst-case complexity
Program analysis and automated test generation have primarily been used to find correctness bugs. We present complexity testing, a novel automated test generation technique to ...
Jacob Burnim, Sudeep Juvekar, Koushik Sen
WADS
2007
Springer
156views Algorithms» more  WADS 2007»
14 years 2 months ago
Cuttings for Disks and Axis-Aligned Rectangles
We present new asymptotically tight bounds on cuttings, a fundamental data structure in computational geometry. For n objects in space and a parameter r ∈ N, an 1 r -cutting is ...
Eynat Rafalin, Diane L. Souvaine, Csaba D. T&oacut...
MEDIAFORENSICS
2010
13 years 10 months ago
Managing a large database of camera fingerprints
Sensor fingerprint is a unique noise-like pattern caused by slightly varying pixel dimensions and inhomogeneity of the silicon wafer from which the sensor is made. The fingerprint...
Miroslav Goljan, Jessica J. Fridrich, Tomás...
NIPS
2004
13 years 10 months ago
Identifying Protein-Protein Interaction Sites on a Genome-Wide Scale
Protein interactions typically arise from a physical interaction of one or more small sites on the surface of the two proteins. Identifying these sites is very important for drug ...
Haidong Wang, Eran Segal, Asa Ben-Hur, Daphne Koll...