Sciweavers

675 search results - page 128 / 135
» On Compression of Parse Trees
Sort
View
ACMSE
2006
ACM
14 years 2 months ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.
FOCS
2009
IEEE
14 years 14 days ago
Space-Efficient Framework for Top-k String Retrieval Problems
Given a set D = {d1, d2, ..., dD} of D strings of total length n, our task is to report the "most relevant" strings for a given query pattern P. This involves somewhat mo...
Wing-Kai Hon, Rahul Shah, Jeffrey Scott Vitter
ICIP
2008
IEEE
14 years 10 months ago
Wavelet-based multi-view video coding with joint best basis wavelet packets
An approach to scalable multi-view video coding with joint best basis wavelet packets is examined in this paper. A 4-D wavelet transform is used to decorrelate the multi-view vide...
André Kaup, Béatrice Pesquet-Popescu...
ICDE
2007
IEEE
220views Database» more  ICDE 2007»
14 years 10 months ago
Structural Selectivity Estimation for XML Documents
Estimating the selectivity of queries is a crucial problem in database systems. Virtually all database systems rely on the use of selectivity estimates to choose amongst the many ...
Damien K. Fisher, Sebastian Maneth
AUSDM
2007
Springer
131views Data Mining» more  AUSDM 2007»
14 years 2 months ago
A Bottom-Up Projection Based Algorithm for Mining High Utility Itemsets
Mining High Utility Itemsets from a transaction database is to find itemsests that have utility above a user-specified threshold. This problem is an extension of Frequent Itemset ...
Alva Erwin, Raj P. Gopalan, N. R. Achuthan