Sciweavers

1301 search results - page 126 / 261
» Bounded Version Vectors
Sort
View
COMPGEOM
2003
ACM
14 years 4 months ago
Controlled perturbation for arrangements of circles
Given a collection C of circles in the plane, we wish to construct the arrangement A(C) (namely the subdivision of the plane into vertices, edges and faces induced by C) using fl...
Dan Halperin, Eran Leiserowitz
VIROLOGY
2008
121views more  VIROLOGY 2008»
13 years 10 months ago
Constructing malware normalizers using term rewriting
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation engines are used at distribution sites or in self-pro...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...
ICCV
2005
IEEE
15 years 22 days ago
Detecting Rotational Symmetries
We present an algorithm for detecting multiple rotational symmetries in natural images. Given an image, its gradient magnitude field is computed, and information from the gradient...
V. Shiv Naga Prasad, Larry S. Davis
ICIP
2004
IEEE
15 years 12 days ago
Multidimensional signal compression using multi-scale recurrent patterns with smooth side-match criterion
The recently proposed method for image compression based on multi-scale recurrent patterns, the MMP (Multidimensional Multiscale Parser) has been shown to perform well for a large...
Eddie B. L. Filho, Murilo B. de Carvalho, Eduardo ...
KDD
2008
ACM
192views Data Mining» more  KDD 2008»
14 years 11 months ago
Partial least squares regression for graph mining
Attributed graphs are increasingly more common in many application domains such as chemistry, biology and text processing. A central issue in graph mining is how to collect inform...
Hiroto Saigo, Koji Tsuda, Nicole Krämer