Sciweavers

740 search results - page 137 / 148
» FAST Extended Release
Sort
View
ICDM
2002
IEEE
145views Data Mining» more  ICDM 2002»
14 years 2 months ago
Mining Top-K Frequent Closed Patterns without Minimum Support
In this paper, we propose a new mining task: mining top-k frequent closed patterns of length no less than min , where k is the desired number of frequent closed patterns to be min...
Jiawei Han, Jianyong Wang, Ying Lu, Petre Tzvetkov
FUN
2010
Springer
233views Algorithms» more  FUN 2010»
14 years 2 months ago
The Complexity of Flood Filling Games
We study the complexity of the popular one player combinatorial game known as Flood-It. In this game the player is given an n×n board of tiles where each tile is allocated one of ...
David Arthur, Raphaël Clifford, Markus Jalsen...
INDOCRYPT
2001
Springer
14 years 2 months ago
Mobile Agent Route Protection through Hash-Based Mechanisms
Abstract. One approach to secure mobile agent execution is restricting the agent route to trusted environments. A necessary condition for this approach to be practical is that the ...
Josep Domingo-Ferrer
PEPM
1999
ACM
14 years 2 months ago
Certifying Compilation and Run-Time Code Generation
A certifying compiler takes a source language program and produces object code, as well as a certi cate" that can be used to verify that the object code satis es desirable pr...
Luke Hornof, Trevor Jim
SIGGRAPH
1998
ACM
14 years 2 months ago
A Beam Tracing Approach to Acoustic Modeling for Interactive Virtual Environments
Virtual environment research has focused on interactive image generation and has largely ignored acoustic modeling for spatialization of sound. Yet, realistic auditory cues can co...
Thomas A. Funkhouser, Ingrid Carlbom, Gary Elko, G...