Sciweavers

1918 search results - page 194 / 384
» Discovering Cortical Algorithms
Sort
View
ADBIS
1999
Springer
104views Database» more  ADBIS 1999»
14 years 1 months ago
Mining Various Patterns in Sequential Data in an SQL-like Manner
Abstract. One of the most important data mining tasks is discovery of frequently occurring patterns in sequences of events. Many algorithms for finding various patterns in sequenti...
Marek Wojciechowski
IH
1999
Springer
14 years 1 months ago
An Asymmetric Public Detection Watermarking Technique
The new watermarking technique1 presented in this paper is an example of an asymmetric public detection scheme. The detection process does not need the original picture nor the sec...
Teddy Furon, Pierre Duhamel
FSE
2007
Springer
142views Cryptology» more  FSE 2007»
14 years 1 months ago
A New Class of Weak Keys for Blowfish
The reflection attack is a recently discovered self similarity analysis which is usually mounted on ciphers with many fixed points. In this paper, we describe two reflection attack...
Orhun Kara, Cevat Manap
AIRS
2006
Springer
14 years 1 months ago
Natural Document Clustering by Clique Percolation in Random Graphs
Document clustering techniques mostly depend on models that impose explicit and/or implicit priori assumptions as to the number, size, disjunction characteristics of clusters, and/...
Wei Gao, Kam-Fai Wong
BPM
2006
Springer
153views Business» more  BPM 2006»
14 years 1 months ago
Decision Mining in ProM
Process-aware Information Systems typically log events (e.g., in transaction logs or audit trails) related to the actual business process executions. Proper analysis of these execu...
Anne Rozinat, Wil M. P. van der Aalst