Sciweavers

12264 search results - page 2344 / 2453
» Analysis of the rubberband algorithm
Sort
View
143
Voted
SIGMOD
2002
ACM
132views Database» more  SIGMOD 2002»
16 years 3 months ago
Clustering by pattern similarity in large data sets
Clustering is the process of grouping a set of objects into classes of similar objects. Although definitions of similarity vary from one clustering model to another, in most of th...
Haixun Wang, Wei Wang 0010, Jiong Yang, Philip S. ...
148
Voted
SIGMOD
2001
ACM
146views Database» more  SIGMOD 2001»
16 years 3 months ago
On Supporting Containment Queries in Relational Database Management Systems
Virtually all proposals for querying XML include a class of query we term "containment queries". It is also clear that in the foreseeable future, a substantial amount of...
Chun Zhang, Jeffrey F. Naughton, David J. DeWitt, ...
123
Voted
EDBT
2008
ACM
129views Database» more  EDBT 2008»
16 years 3 months ago
Continuous multi-way joins over distributed hash tables
This paper studies the problem of evaluating continuous multi-way joins on top of Distributed Hash Tables (DHTs). We present a novel algorithm, called recursive join (RJoin), that...
Stratos Idreos, Erietta Liarou, Manolis Koubarakis
ICIAP
2005
ACM
16 years 3 months ago
Asymmetric 3D/2D Processing: A Novel Approach for Face Recognition
Facial image analysis is very useful in many applications such as video compression, talking heads, or biometrics. During the last few years, many algorithms have been proposed in ...
Daniel Riccio, Jean-Luc Dugelay
115
Voted
ICSE
2005
IEEE-ACM
16 years 3 months ago
Automatic discovery of API-level exploits
We argue that finding vulnerabilities in software components is different from finding exploits against them. Exploits that compromise security often use several low-level details...
Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Tho...
« Prev « First page 2344 / 2453 Last » Next »