Sciweavers

2131 search results - page 22 / 427
» Immunity for Closed Sets
Sort
View
PKDD
2005
Springer
145views Data Mining» more  PKDD 2005»
14 years 4 months ago
A Correspondence Between Maximal Complete Bipartite Subgraphs and Closed Patterns
For an undirected graph ¢ without self-loop, we prove: (i) that the number of closed patterns in the adjacency matrix of ¢ is even; (ii) that the number of the closed patterns i...
Jinyan Li, Haiquan Li, Donny Soh, Limsoon Wong
ICCS
2007
Springer
14 years 5 months ago
Mining Frequent Closed Unordered Trees Through Natural Representations
Abstract. Many knowledge representation mechanisms consist of linkbased structures; they may be studied formally by means of unordered trees. Here we consider the case where labels...
José L. Balcázar, Albert Bifet, Anto...
ICIAR
2007
Springer
14 years 5 months ago
Automatic Closed Edge Detection Using Level Lines Selection
This paper presents a closed edge detection method based on a level lines selection approach. The proposed method is based on an unsupervised probabilistic scheme using an a contra...
Thomas Hurtut, Farida Cheriet
HICSS
2010
IEEE
152views Biometrics» more  HICSS 2010»
14 years 3 months ago
Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest that We have Asked the Wrong Que
While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments...
Guido Schryen, Eliot Rich
ECAI
2008
Springer
14 years 21 days ago
Propositional merging operators based on set-theoretic closeness
In the propositional setting, a well-studied family of merging operators are distance-based ones: the models of the merged base are the closest interpretations to the given profile...
Patricia Everaere, Sébastien Konieczny, Pie...