Sciweavers

2006 search results - page 377 / 402
» Heuristic Security-Testing Methods
Sort
View
PAMI
2010
147views more  PAMI 2010»
13 years 7 months ago
The Groupwise Medial Axis Transform for Fuzzy Skeletonization and Pruning
—Medial representations of shapes are useful due to their use of an object-centered coordinate system that directly captures intuitive notions of shape such as thickness, bending...
Aaron D. Ward, Ghassan Hamarneh
TKDE
2010
274views more  TKDE 2010»
13 years 7 months ago
Ranked Query Processing in Uncertain Databases
—Recently, many new applications, such as sensor data monitoring and mobile device tracking, raise up the issue of uncertain data management. Compared to “certain” data, the ...
Xiang Lian, Lei Chen 0002
FPL
2010
Springer
188views Hardware» more  FPL 2010»
13 years 7 months ago
SeqHive: A Reconfigurable Computer Cluster for Genome Re-sequencing
We demonstrate how Field Programmable Gate Arrays (FPGAs) may be used to address the computing challenges associated with assembling genome sequences from recent ultra-high-through...
Kristian Stevens, Henry Chen, Terry Filiba, Peter ...
ICDM
2010
IEEE
111views Data Mining» more  ICDM 2010»
13 years 7 months ago
ValuePick: Towards a Value-Oriented Dual-Goal Recommender System
Given a user in a social network, which new friends should we recommend, the dual goal being to achieve user satisfaction and good network connectivity? Similarly, which new produc...
Leman Akoglu, Christos Faloutsos
ALENEX
2009
172views Algorithms» more  ALENEX 2009»
13 years 7 months ago
Rank Aggregation: Together We're Strong
We consider the problem of finding a ranking of a set of elements that is "closest to" a given set of input rankings of the elements; more precisely, we want to find a p...
Frans Schalekamp, Anke van Zuylen