Sciweavers

1040 search results - page 172 / 208
» TCAM-conscious Algorithms for Data Streams
Sort
View
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 9 months ago
On Finding Frequent Patterns in Event Sequences
Given a directed acyclic graph with labeled vertices, we consider the problem of finding the most common label sequences ("traces") among all paths in the graph (of some...
Andrea Campagna, Rasmus Pagh
KAIS
2010
139views more  KAIS 2010»
13 years 7 months ago
Periodic subgraph mining in dynamic networks
In systems of interacting entities such as social networks, interactions that occur regularly typically correspond to significant, yet often infrequent and hard to detect, interact...
Mayank Lahiri, Tanya Y. Berger-Wolf
TWC
2010
13 years 3 months ago
Closed-Loop Transmit Diversity with Imperfect Feedback
The closed-loop transmit diversity technique is used to improve the performance of the downlink channel in MIMO communication systems. In these closed-loop systems, feedback delay...
A. Heidari, Amir K. Khandani
WSDM
2012
ACM
290views Data Mining» more  WSDM 2012»
12 years 4 months ago
Online selection of diverse results
The phenomenal growth in the volume of easily accessible information via various web-based services has made it essential for service providers to provide users with personalized ...
Debmalya Panigrahi, Atish Das Sarma, Gagan Aggarwa...
PAKDD
2009
ACM
72views Data Mining» more  PAKDD 2009»
14 years 3 months ago
A Multi-resolution Approach for Atypical Behaviour Mining
Atypical behaviours are the basis of a valuable knowledge in domains related to security (e.g. fraud detection for credit card [1], cyber security [4] or safety of critical systems...
Alice Marascu, Florent Masseglia