Sciweavers

2006 search results - page 377 / 402
» Heuristic Security-Testing Methods
Sort
View
123
Voted
PAMI
2010
147views more  PAMI 2010»
15 years 18 days ago
The Groupwise Medial Axis Transform for Fuzzy Skeletonization and Pruning
—Medial representations of shapes are useful due to their use of an object-centered coordinate system that directly captures intuitive notions of shape such as thickness, bending...
Aaron D. Ward, Ghassan Hamarneh
TKDE
2010
274views more  TKDE 2010»
15 years 17 days ago
Ranked Query Processing in Uncertain Databases
—Recently, many new applications, such as sensor data monitoring and mobile device tracking, raise up the issue of uncertain data management. Compared to “certain” data, the ...
Xiang Lian, Lei Chen 0002
164
Voted
FPL
2010
Springer
188views Hardware» more  FPL 2010»
15 years 6 days ago
SeqHive: A Reconfigurable Computer Cluster for Genome Re-sequencing
We demonstrate how Field Programmable Gate Arrays (FPGAs) may be used to address the computing challenges associated with assembling genome sequences from recent ultra-high-through...
Kristian Stevens, Henry Chen, Terry Filiba, Peter ...
113
Voted
ICDM
2010
IEEE
111views Data Mining» more  ICDM 2010»
15 years 5 days ago
ValuePick: Towards a Value-Oriented Dual-Goal Recommender System
Given a user in a social network, which new friends should we recommend, the dual goal being to achieve user satisfaction and good network connectivity? Similarly, which new produc...
Leman Akoglu, Christos Faloutsos
ALENEX
2009
172views Algorithms» more  ALENEX 2009»
15 years 1 days ago
Rank Aggregation: Together We're Strong
We consider the problem of finding a ranking of a set of elements that is "closest to" a given set of input rankings of the elements; more precisely, we want to find a p...
Frans Schalekamp, Anke van Zuylen