Sciweavers

641 search results - page 96 / 129
» Collusion set detection using graph clustering
Sort
View
DASFAA
2007
IEEE
138views Database» more  DASFAA 2007»
14 years 3 months ago
An Original Semantics to Keyword Queries for XML Using Structural Patterns
XML is by now the de facto standard for exporting and exchanging data on the web. The need for querying XML data sources whose structure is not fully known to the user and the need...
Dimitri Theodoratos, Xiaoying Wu
TSP
2010
13 years 3 months ago
On local intrinsic dimension estimation and its applications
In this paper, we present multiple novel applications for local intrinsic dimension estimation. There has been much work done on estimating the global dimension of a data set, typi...
Kevin M. Carter, Raviv Raich, Alfred O. Hero
ICPR
2006
IEEE
14 years 9 months ago
Learning Policies for Efficiently Identifying Objects of Many Classes
Viola and Jones (VJ) cascade classification methods have proven to be very successful in detecting objects belonging to a single class -- e.g., faces. This paper addresses the mor...
Ahmed M. Elgammal, Ramana Isukapalli, Russell Grei...
METRICS
2002
IEEE
14 years 1 months ago
Gemini: Maintenance Support Environment Based on Code Clone Analysis
Maintaining software systems is getting more complex and difficult task, as the scale becomes larger. It is generally said that code clone is one of the factors that make softwar...
Yasushi Ueda, Toshihiro Kamiya, Shinji Kusumoto, K...
CORR
2010
Springer
107views Education» more  CORR 2010»
13 years 7 months ago
Maximum Betweenness Centrality: Approximability and Tractable Cases
The Maximum Betweenness Centrality problem (MBC) can be defined as follows. Given a graph find a k-element node set C that maximizes the probability of detecting communication be...
Martin Fink, Joachim Spoerhase