Sciweavers

715 search results - page 73 / 143
» Second step algorithms in the Burrows-Wheeler compression al...
Sort
View
ISCI
2007
123views more  ISCI 2007»
13 years 8 months ago
Mining spatial association rules in image databases
In this paper, we propose a novel spatial mining algorithm, called 9DLT-Miner, to mine the spatial association rules from an image database, where every image is represented by th...
Anthony J. T. Lee, Ruey-Wen Hong, Wei-Min Ko, Wen-...
COCO
2011
Springer
221views Algorithms» more  COCO 2011»
12 years 8 months ago
Non-uniform ACC Circuit Lower Bounds
The class ACC consists of circuit families with constant depth over unbounded fan-in AND, OR, NOT, and MODm gates, where m > 1 is an arbitrary constant. We prove: • NTIME[2n ...
Ryan Williams
ICPR
2008
IEEE
14 years 3 months ago
Image analysis approach for identification of renal transplant rejection
Acute renal rejection is the most common reason for graft (transplanted kidney) failure after kidney transplantation, and early detection is crucial to survival of function in the...
Ayman El-Baz, Georgy L. Gimel'farb, Mohamed Abou E...
COMPSEC
2010
122views more  COMPSEC 2010»
13 years 7 months ago
Taming role mining complexity in RBAC
In this paper we address the problem of reducing the role mining complexity in RBAC systems. To this aim, we propose a three steps methodology: first, we associate a weight to rol...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
13 years 10 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny