Sciweavers

1466 search results - page 137 / 294
» Completeness of the Authentication Tests
Sort
View
CCS
2009
ACM
14 years 2 months ago
Learning your identity and disease from research papers: information leaks in genome wide association study
Genome-wide association studies (GWAS) aim at discovering the association between genetic variations, particularly single-nucleotide polymorphism (SNP), and common diseases, which...
Rui Wang, Yong Fuga Li, XiaoFeng Wang, Haixu Tang,...
CVPR
2007
IEEE
14 years 10 months ago
Image Segmentation by Probabilistic Bottom-Up Aggregation and Cue Integration
We present a parameter free approach that utilizes multiple cues for image segmentation. Beginning with an image, we execute a sequence of bottom-up aggregation steps in which pix...
Sharon Alpert, Meirav Galun, Ronen Basri, Achi Bra...
ICIP
2004
IEEE
14 years 9 months ago
Fast in-band motion estimation with variable size block matching
In this paper we propose a fast motion estimation technique that works in the wavelet domain. The computational cost of the algorithm turns out to be proportional to the linear si...
Davide Maestroni, Augusto Sarti, Marco Tagliasacch...
ICDE
2006
IEEE
222views Database» more  ICDE 2006»
14 years 9 months ago
CLAN: An Algorithm for Mining Closed Cliques from Large Dense Graph Databases
Most previously proposed frequent graph mining algorithms are intended to find the complete set of all frequent, closed subgraphs. However, in many cases only a subset of the freq...
Jianyong Wang, Zhiping Zeng, Lizhu Zhou
VLDB
2001
ACM
104views Database» more  VLDB 2001»
14 years 8 months ago
Global transaction support for workflow management systems: from formal specification to practical implementation
In this paper, we present an approach to global transactionmanagementinworkflowenvironments.Thetransaction mechanism is based on the well-known notion of compensation, but extended...
Paul W. P. J. Grefen, Jochem Vonk, Peter M. G. Ape...