Sciweavers

4903 search results - page 935 / 981
» The Set Covering Machine
Sort
View
ICDM
2006
IEEE
166views Data Mining» more  ICDM 2006»
14 years 1 months ago
Mining Generalized Graph Patterns Based on User Examples
There has been a lot of recent interest in mining patterns from graphs. Often, the exact structure of the patterns of interest is not known. This happens, for example, when molecu...
Pavel Dmitriev, Carl Lagoze
ISPASS
2006
IEEE
14 years 1 months ago
Modeling TCAM power for next generation network devices
Applications in Computer Networks often require high throughput access to large data structures for lookup and classification. Many advanced algorithms exist to speed these searc...
Banit Agrawal, Timothy Sherwood
SIBGRAPI
2006
IEEE
14 years 1 months ago
Non-Extensive Entropy for CAD Systems of Breast Cancer Images
Recent statistics show that breast cancer is a major cause of death among women in all of the world. Hence, early diagnostic with Computer Aided Diagnosis (CAD) systems is a very ...
Paulo S. Rodrigues, Ruey-Feng Chang, Jasjit S. Sur...
ANCS
2006
ACM
14 years 1 months ago
WormTerminator: an effective containment of unknown and polymorphic fast spreading worms
The fast spreading worm is becoming one of the most serious threats to today’s networked information systems. A fast spreading worm could infect hundreds of thousands of hosts w...
Songqing Chen, Xinyuan Wang, Lei Liu, Xinwen Zhang
SOUPS
2006
ACM
14 years 1 months ago
An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench
Today organizations do not have good ways of linking their written privacy policies with the implementation of those policies. To assist organizations in addressing this issue, ou...
Carolyn Brodie, Clare-Marie Karat, John Karat