Sciweavers

2620 search results - page 76 / 524
» An Evaluation Technique for Binarization Algorithms
Sort
View
ICDAR
2003
IEEE
14 years 1 months ago
Comparison of Some Thresholding Algorithms for Text/Background Segmentation in Difficult Document Images
A number of techniques have previously been proposed for effective thresholding of document images. In this paper two new thresholding techniques are proposed and compared against...
Graham Leedham, Yan Chen, Kalyan Takru, Joie Hadi ...
FIMI
2004
279views Data Mining» more  FIMI 2004»
13 years 9 months ago
DCI Closed: A Fast and Memory Efficient Algorithm to Mine Frequent Closed Itemsets
One of the main problems raising up in the frequent closed itemsets mining problem is the duplicate detection. In this paper we propose a general technique for promptly detecting ...
Claudio Lucchese, Salvatore Orlando, Raffaele Pere...
CIS
2005
Springer
14 years 1 months ago
An Improved EMASK Algorithm for Privacy-Preserving Frequent Pattern Mining
Abstract. As a novel research direction, privacy-preserving data mining (PPDM) has received a great deal of attentions from more and more researchers, and a large number of PPDM al...
Congfu Xu, Jinlong Wang, Hongwei Dan, Yunhe Pan
PODC
2010
ACM
13 years 9 months ago
Brief announcement: efficient graph algorithms without synchronization
We give a graph decomposition technique that creates entirely independent subproblems for graph problems such as coloring and dominating sets that can be solved without synchroniz...
Johannes Schneider, Roger Wattenhofer
COLING
1994
13 years 9 months ago
Universal Guides And Finiteness And Symmetry Of Grammar Processing Algorithms
This paper presents a novel technique called "universal guides" which explores inherent properties of logic grammars (changing variable binding status) in order to chara...
Miroslav Martinovic