Sciweavers

7015 search results - page 1086 / 1403
» Approximation algorithms for co-clustering
Sort
View
137
Voted
CAV
2009
Springer
157views Hardware» more  CAV 2009»
16 years 5 months ago
Explaining Counterexamples Using Causality
Abstract. When a model does not satisfy a given specification, a counterexample is produced by the model checker to demonstrate the failure. A user must then examine the counterexa...
Ilan Beer, Shoham Ben-David, Hana Chockler, Avigai...
116
Voted
KDD
2006
ACM
136views Data Mining» more  KDD 2006»
16 years 5 months ago
Very sparse random projections
There has been considerable interest in random projections, an approximate algorithm for estimating distances between pairs of points in a high-dimensional vector space. Let A Rn...
Ping Li, Trevor Hastie, Kenneth Ward Church
KDD
2005
ACM
92views Data Mining» more  KDD 2005»
16 years 5 months ago
Summarizing itemset patterns: a profile-based approach
Frequent-pattern mining has been studied extensively on scalable methods for mining various kinds of patterns including itemsets, sequences, and graphs. However, the bottleneck of...
Xifeng Yan, Hong Cheng, Jiawei Han, Dong Xin
134
Voted
RECOMB
2008
Springer
16 years 5 months ago
Automatic Parameter Learning for Multiple Network Alignment
We developed Gr?mlin 2.0, a new multiple network aligner with (1) a novel scoring function that can use arbitrary features of a multiple network alignment, such as protein deletion...
Jason Flannick, Antal F. Novak, Chuong B. Do, Bala...
STOC
2005
ACM
93views Algorithms» more  STOC 2005»
16 years 5 months ago
Representing hard lattices with O(n log n) bits
We present a variant of the Ajtai-Dwork public-key cryptosystem where the size of the public-key is only O(n log n) bits and the encrypted text/clear text ratio is also O(n log n)...
Miklós Ajtai
« Prev « First page 1086 / 1403 Last » Next »