Sciweavers

135 search results - page 25 / 27
» Bounded Vector Signatures and their Applications
Sort
View
160
Voted
ADC
2008
Springer
156views Database» more  ADC 2008»
15 years 10 months ago
Interactive Mining of Frequent Itemsets over Arbitrary Time Intervals in a Data Stream
Mining frequent patterns in a data stream is very challenging for the high complexity of managing patterns with bounded memory against the unbounded data. While many approaches as...
Ming-Yen Lin, Sue-Chen Hsueh, Sheng-Kun Hwang
100
Voted
EUSFLAT
2007
152views Fuzzy Logic» more  EUSFLAT 2007»
15 years 5 months ago
The Core of Games on Distributive Lattices
Cooperative games under precedence constraints have been introduced by Faigle and Kern [1] , [4] as a generalization of classical cooperative games. An important notion in coopera...
Lijue Xie, Michel Grabisch
148
Voted
MOC
2010
14 years 10 months ago
Analysis of a finite PML approximation to the three dimensional elastic wave scattering problem
We consider the application of a perfectly matched layer (PML) technique to approximate solutions to the elastic wave scattering problem in the frequency domain. The PML is viewed ...
James H. Bramble, Joseph E. Pasciak, Dimitar Trene...
157
Voted
SIGMOD
2011
ACM
203views Database» more  SIGMOD 2011»
14 years 6 months ago
Effective data co-reduction for multimedia similarity search
Multimedia similarity search has been playing a critical role in many novel applications. Typically, multimedia objects are described by high-dimensional feature vectors (or point...
Zi Huang, Heng Tao Shen, Jiajun Liu, Xiaofang Zhou
225
Voted
SIGMOD
2006
ACM
127views Database» more  SIGMOD 2006»
16 years 3 months ago
Efficient reverse k-nearest neighbor search in arbitrary metric spaces
The reverse k-nearest neighbor (RkNN) problem, i.e. finding all objects in a data set the k-nearest neighbors of which include a specified query object, is a generalization of the...
Elke Achtert, Christian Böhm, Peer Kröge...