Sciweavers

4536 search results - page 754 / 908
» Contention-Sensitive Data Structures and Algorithms
Sort
View
KDD
2007
ACM
189views Data Mining» more  KDD 2007»
14 years 11 months ago
Corroborate and learn facts from the web
The web contains lots of interesting factual information about entities, such as celebrities, movies or products. This paper describes a robust bootstrapping approach to corrobora...
Shubin Zhao, Jonathan Betz
PAKDD
2009
ACM
170views Data Mining» more  PAKDD 2009»
14 years 8 months ago
Discovering Periodic-Frequent Patterns in Transactional Databases.
Since mining frequent patterns from transactional databases involves an exponential mining space and generates a huge number of patterns, efficient discovery of user-interest-based...
Byeong-Soo Jeong, Chowdhury Farhan Ahmed, Syed Kha...
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
14 years 5 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
ACCV
2009
Springer
14 years 5 months ago
Robust Focal Length Estimation by Voting in Multi-view Scene Reconstruction
We propose a new robust focal length estimation method in multi-view structure from motion from unordered data sets, e.g. downloaded from the Flickr database, where jpeg-exif heade...
Martin Bujnak, Zuzana Kukelova, Tomás Pajdl...
ESWS
2009
Springer
14 years 5 months ago
Ranking Approximate Answers to Semantic Web Queries
We consider the problem of a user querying semistructured data such as RDF without knowing its structure. In these circumstances, it is helpful if the querying system can perform a...
Carlos A. Hurtado, Alexandra Poulovassilis, Peter ...