Sciweavers

686 search results - page 101 / 138
» Inexact pattern matching using genetic algorithm
Sort
View
ASUNAM
2010
IEEE
13 years 9 months ago
COSI: Cloud Oriented Subgraph Identification in Massive Social Networks
Subgraph matching is a key operation on graph data. Social network (SN) providers may want to find all subgraphs within their social network that "match" certain query gr...
Matthias Bröcheler, Andrea Pugliese, V. S. Su...
ICONIP
2010
13 years 5 months ago
Online Gesture Recognition for User Interface on Accelerometer Built-in Mobile Phones
Recently, several smart phones are equipped with a 3D-accelerometer that can be used for gesture-based user interface (UI). In order to utilize the gesture UI for the real-time sys...
BongWhan Choe, Jun-Ki Min, Sung-Bae Cho
CCP
2011
92views more  CCP 2011»
12 years 7 months ago
Backwards Search in Context Bound Text Transformations
—The Burrows-Wheeler Transform (BWT) is the basis for many of the most effective compression and selfindexing methods used today. A key to the versatility of the BWT is the abili...
Matthias Petri, Gonzalo Navarro, J. Shane Culpeppe...
GECCO
2008
Springer
139views Optimization» more  GECCO 2008»
13 years 8 months ago
Evolutionary design of dynamic SwarmScapes
This paper discusses interactive evolutionary algorithms and their application in swarm-based image generation. From an artist’s perspective, the computer-generated patterns oï¬...
Namrata Khemka, Scott Novakowski, Gerald Hushlak, ...
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 8 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...