Sciweavers

279 search results - page 52 / 56
» Tree Pattern Rewriting Systems
Sort
View
ICDT
2010
ACM
194views Database» more  ICDT 2010»
13 years 10 months ago
Bag Equivalence of XPath Queries
When a query is evaluated under bag semantics, each answer is returned as many times as it has derivations. Bag semantics has long been recognized as important, especially when ag...
Sara Cohen, Yaacov Y. Weiss
CEAS
2008
Springer
13 years 10 months ago
A Campaign-based Characterization of Spamming Strategies
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...
EVOW
2008
Springer
13 years 10 months ago
A Hybrid Random Subspace Classifier Fusion Approach for Protein Mass Spectra Classification
Classifier fusion strategies have shown great potential to enhance the performance of pattern recognition systems. There is an agreement among researchers in classifier combination...
Amin Assareh, Mohammad Hassan Moradi, L. Gwenn Vol...
DICTA
2003
13 years 9 months ago
Learning Semantic Concepts from Visual Data Using Neural Networks
For content-based image retrieval techniques, query image is used to pick up and rank some relevant images from a database using some certain similarity metric. If semantic feature...
Xiaohang Ma, Dianhui Wang
PR
2008
145views more  PR 2008»
13 years 8 months ago
Probabilistic suffix models for API sequence analysis of Windows XP applications
Given the pervasive nature of malicious mobile code (viruses, worms, etc.), developing statistical/structural models of code execution is of considerable importance. We investigat...
Geoffrey Mazeroff, Jens Gregor, Michael G. Thomaso...