Sciweavers

3070 search results - page 205 / 614
» Making pattern mining useful
Sort
View
IFIP
2004
Springer
14 years 1 months ago
Pattern-Matching Spi-Calculus
Cryptographic protocols often make use of nested cryptographic primitives, for example signed message digests, or encrypted signed messages. Gordon and Jeffrey’s prior work on ty...
Christian Haack, Alan Jeffrey
PRIB
2009
Springer
135views Bioinformatics» more  PRIB 2009»
14 years 2 months ago
Sequential Hierarchical Pattern Clustering
Abstract. Clustering is a widely used unsupervised data analysis technique in machine learning. However, a common requirement amongst many existing clustering methods is that all p...
Bassam Farran, Amirthalingam Ramanan, Mahesan Nira...
CLEF
2004
Springer
13 years 12 months ago
Pattern-Based Image Retrieval with Constraints and Preferences on ImageCLEF 2004
This paper presents the approach used by the University of Alicante in the ImageCLEF 2004 adhoc retrieval task. This task is performed by multilingual search requests (topics) agai...
Maximiliano Saiz-Noeda, José Luis Vicedo Go...
KDD
1998
ACM
141views Data Mining» more  KDD 1998»
14 years 12 days ago
Rule Discovery from Time Series
We consider the problem of nding rules relating patterns in a time series to other patterns in that series, or patterns in one series to patterns in another series. A simple examp...
Gautam Das, King-Ip Lin, Heikki Mannila, Gopal Ren...
CORR
2008
Springer
155views Education» more  CORR 2008»
13 years 7 months ago
Software dependability modeling using an industry-standard architecture description language
: Performing dependability evaluation along with other analyses at architectural level allows both making architectural tradeoffs and predicting the effects of architectural decisi...
Ana-Elena Rugina, Peter H. Feiler, Karama Kanoun, ...