Sciweavers

337 search results - page 21 / 68
» An Information-Theoretic Definition of Similarity
Sort
View
KDD
2012
ACM
164views Data Mining» more  KDD 2012»
11 years 11 months ago
SeqiBloc: mining multi-time spanning blockmodels in dynamic graphs
Blockmodelling is an important technique for decomposing graphs into sets of roles. Vertices playing the same role have similar patterns of interactions with vertices in other rol...
Jeffrey Chan, Wei Liu, Christopher Leckie, James B...
APCSAC
2001
IEEE
14 years 11 days ago
Stacking them up: a Comparison of Virtual Machines
A popular trend in current software technology is to gain program portability by compiling programs to an inte form based on an abstract machine definition. Such approaches date b...
K. John Gough
MICCAI
2007
Springer
14 years 9 months ago
Is a Single Energy Functional Sufficient? Adaptive Energy Functionals and Automatic Initialization
Energy functional minimization is an increasingly popular technique for image segmentation. However, it is far too commonly applied with hand-tuned parameters and initializations t...
Chris McIntosh, Ghassan Hamarneh
CADE
2004
Springer
14 years 9 months ago
Rewriting Logic Semantics: From Language Specifications to Formal Analysis Tools
Formal semantic definitions of concurrent languages, when specified in a well-suited semantic framework and supported by generic and efficient formal tools, can be the basis of pow...
José Meseguer, Grigore Rosu
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
14 years 22 days ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...