Sciweavers

2006 search results - page 303 / 402
» Heuristic Security-Testing Methods
Sort
View
ICDE
2006
IEEE
196views Database» more  ICDE 2006»
14 years 11 months ago
Closure-Tree: An Index Structure for Graph Queries
Graphs have become popular for modeling structured data. As a result, graph queries are becoming common and graph indexing has come to play an essential role in query processing. ...
Huahai He, Ambuj K. Singh
ICDE
2002
IEEE
106views Database» more  ICDE 2002»
14 years 11 months ago
OSSM: A Segmentation Approach to Optimize Frequency Counting
Computing the frequency of a pattern is one of the key operations in data mining algorithms. We describe a simple yet powerful way of speeding up any form of frequency counting sa...
Carson Kai-Sang Leung, Raymond T. Ng, Heikki Manni...
ICPR
2006
IEEE
14 years 10 months ago
Finding Rule Groups to Classify High Dimensional Gene Expression Datasets
Microarray data provides quantitative information about the transcription profile of cells. To analyze microarray datasets, methodology of machine learning has increasingly attrac...
Jiyuan An, Yi-Ping Phoebe Chen
ICPR
2006
IEEE
14 years 10 months ago
Five-Point Motion Estimation Made Easy
Estimating relative camera motion from two views is a classical problem in computer vision. The minimal case for such problem is the so-called five-point-problem, for which the st...
Hongdong Li, Richard I. Hartley
ICPR
2000
IEEE
14 years 10 months ago
Stability Analysis of Medial Axis Transform under Relative Hausdorff Distance
Medial axis transform (MAT) is a basic tool for shape analysis. But, in spite of its usefulness, it has some drawbacks, one of which is its instability under the boundary perturba...
Sung Woo Choi, Seong-Whan Lee