Zobrazeno 1 - 10
of 239
pro vyhledávání: '"Wildcard character"'
Publikováno v:
Data Mining and Knowledge Discovery. 35:1225-1257
Periodic pattern has been utilized in many real life applications, such as weather conditions in a particular season, transactions in a superstore, power consumption, computer network fault analysis, and analysis of DNA and protein sequences. Periodi
Autor:
Marcel Wild
Publikováno v:
The Computer Journal. 65:1073-1087
We present a novel technique for converting a Boolean conjunctive normal form (CNF) into an orthogonal disjunctive normal form (DNF), aka exclusive sum of products. Our method (which will be pitted against a hardwired command from Mathematica) zooms
Publikováno v:
Intelligent Data Analysis. 25:283-303
Approximate multi-pattern matching is an important issue that is widely and frequently utilized, when the pattern contains variable-length wildcards. In this paper, two suffix array-based algorithms have been proposed to solve this problem. Suffix ar
Publikováno v:
Technology and Health Care
BACKGROUND: DNA sequence alignment is one of the most fundamental and important operation to identify which gene family may contain this sequence, pattern matching for DNA sequence has been a fundamental issue in biomedical engineering, biotechnology
Publikováno v:
Paleobiology. 47:432-445
Recent studies have acknowledged the many benefits of including fossils in phylogenetic inference (e.g., reducing long-branch attraction). However, unstable taxa are known to be problematic, as they can reduce either the resolution of the strict cons
Publikováno v:
Information Sciences. 529:132-140
Secure two-party pattern matching involves two parties, where a server owns the long text and a client has the pattern. The goal is for the client to learn the positions in which his pattern appears in the text, while leaking nothing to the server. I
Publikováno v:
IEEE Transactions on Services Computing. 13:464-477
Searchable encryption is an important technique for public cloud storage service to provide user data confidentiality protection and at the same time allow users performing keyword search over their encrypted data. Previous schemes only deal with exa
Autor:
Sanjit Chatterjee, Jayam Modi, Akash Shah, Manish Kesarwani, Sayantan Mukherjee, Shravan Kumar Parshuram Puria
Publikováno v:
International Journal of Information Security. 20:199-244
In this work, we investigate the problem of secure wildcard search over encrypted data. The setting comprises of three entities, viz. the data owner, the server and the client. The data owner outsources the encrypted data to the server, who oblivious
Publikováno v:
Applied Intelligence. 50:1832-1845
Pattern matching (PM) with gap constraints (or flexible wildcards) is one of the essential tasks in repetitive sequential pattern mining (or sequence pattern mining), since it can compute the support of a pattern in a sequence. Nonoverlapping PM (or
Autor:
Norah E. M. Brown, Laura E. Coristine, Colin D. MacLeod, Sally N. Aitken, Patrick T. Martone, Alex C. Y. Yeung, Devin R. de Zwaan, Michelle Tseng, Jennifer M. Sunday, Patrick L. Thompson, Megan Bontrager, Jennifer L. Williams, Diane S. Srivastava, Mary I. O'Connor, Christopher D. G. Harley, Jeannette Whitton, Amy L. Angert, Laura Wegener Parfrey, Benjamin G. Freeman, Juli Carrillo, Joey R. Bernhardt, Simon D. Donner, Sarah L. Amundrud
Publikováno v:
Ecological Monographs. 91