We present an approach to hierarchically encode the topology of functions over triangulated surfaces. Its Morse-Smale complex, a well known structure in computational topology, describes the topology of a function. Fo...
详细信息
We present an approach to hierarchically encode the topology of functions over triangulated surfaces. Its Morse-Smale complex, a well known structure in computational topology, describes the topology of a function. Following concepts of Morse theory, a Morse-Smale complex (and therefore a function's topology) can be simplified by successively canceling pairs of critical points. We demonstrate how cancellations can be effectively encoded to produce a highly adaptive topology-based multi-resolution representation of a given function. Contrary to the approach, we avoid encoding the complete complex in a traditional mesh hierarchy. Instead, the information is split into a new structure we call a cancellation forest and a traditional dependency graph. The combination of this new structure with a traditional mesh hierarchy proofs to be significantly more flexible than the one previously reported. In particular, we can create hierarchies that are guaranteed to be of logarithmic height.
The purpose of this paper is to develop a numerical algorithm to track the preheat interface motion driven by radiation transfer in high-intensity laser experiments. Our front-tracking algorithm is coupled to a radiat...
详细信息
We introduce TLHaar, an n-bit to n-bit reversible trans-form similar to the S-transform, TLHaar uses lookup tables that approximate the S-transform, but reorder the co-efficients so they fit into n bits. TLHaar is sui...
详细信息
We introduce TLHaar, an n-bit to n-bit reversible trans-form similar to the S-transform, TLHaar uses lookup tables that approximate the S-transform, but reorder the co-efficients so they fit into n bits. TLHaar is suited for loss-less compression in fixed-width channels, such as digital video channels and graphics hardware frame buffers. Tests indicate that when the incoming image data has lines or hard edges TLHaar coefficients compress better than S-transform coefficients. For other types of image data TL-Haar coefficients compress up to 2.5% worse than those of the S-transform, depending on the data and the compression method used.
The top unresolved problems in visualization were investigated by panelists from both the information and scientific visualization domains. One of the key unresolved challenges in visualization is collaboration in its...
详细信息
ISBN:
(纸本)0780387880
The top unresolved problems in visualization were investigated by panelists from both the information and scientific visualization domains. One of the key unresolved challenges in visualization is collaboration in its broadest sense. Visualization 'scientists' need to spend more time understanding the underlying science applications in order to create effective visual representations. In order to 'evolve' visualization into a more scientific enquiry, visualization scientists need to understand and use the scientific method such as formulation of an hypothesis to explain the phenomena. Effective human computer interaction continues to be one of the top research and development goals for both visualization and computer graphics.
We introduce the piecewise-linear Haar (PLHaar) transform, a reversible n-bit to n-bit transform that is based on the Haar wavelet transform. PLHaar is continuous, while all current n-bit to n-bit methods are not, and...
详细信息
We introduce the piecewise-linear Haar (PLHaar) transform, a reversible n-bit to n-bit transform that is based on the Haar wavelet transform. PLHaar is continuous, while all current n-bit to n-bit methods are not, and is therefore uniquely usable with both lossy and lossless methods (e.g. image compression). PLHaar has both integer and continuous (i.e. non-discrete) forms. By keeping the coefficients to n bits PLHaar is particularly suited for use in hardware environments where channel width is limited, such as digital video channels and graphics hardware.
作者:
Stanley R. M. OliveiraOsmar R. ZaianeEmbrapa Information Technology
Andre Tosello 209 - Barao Geraldo 13083-886 - Campinas SP Brasil and Department of Computing Science University of Alberta Edmonton AB Canada T6G 2E8 s in Electronics from the University ofParis XI
France. He has worked in a variety of research areas such as data mining web mining multimedia databases information retrieval web technology natural language processing distance education and collab
One crucial aspect of privacy preserving frequent itemset mining is the fact that the mining process deals with a trade-off: privacy and accuracy, which are typically contradictory, and improving one usually incurs a ...
详细信息
ISBN:
(纸本)9780909925925
One crucial aspect of privacy preserving frequent itemset mining is the fact that the mining process deals with a trade-off: privacy and accuracy, which are typically contradictory, and improving one usually incurs a cost in the other. One alternative to address this particular problem is to look for a balance between hiding restrictive patterns and disclosing nonrestrictive ones. In this paper, we propose a new framework for enforcing privacy in mining frequent itemsets. We combine, in a single framework, techniques for efficiently hiding restrictive patterns: a transaction retrieval engine relying on an inverted file and Boolean queries; and a set of algorithms to "sanitize" a database. In addition, we introduce performance measures for mining frequent itemsets that quantify the fraction of raining patterns which are preserved after sanitizing a database. We also report the results of a performance evaluation of our research prototype and an analysis of the results.
作者:
Stanley R. M. OliveiraOsmar R. ZaianeEmbrapa Information Technology
Andre Tosello 209 - Barao Geraldo 13083-886 - Campinas SP Brasil and Department of Computing Science University of Alberta Edmonton AB Canada T6G 2E8 s in Electronics from the University ofParis XI
France. He has worked in a variety of research areas such as data mining web mining multimedia databases information retrieval web technology natural language processing distance education and collab
Recent data mining algorithms have been designed for application domains that involve several types of objects stored in multiple relations in relational databases. This fact has motivated the increasing number of suc...
详细信息
ISBN:
(纸本)9780909925925
Recent data mining algorithms have been designed for application domains that involve several types of objects stored in multiple relations in relational databases. This fact has motivated the increasing number of successful applications of relational data mining over recent years. On the other hand, such applications have introduced a new threat to privacy and information security since from non-sensitive data one is able to infer sensitive information, including personal information, facts or even patterns that are not supposed to be disclosed. The existing access control models adopted to successfully manage the access of information in complex systems present some limitations in the context of data mining tasks. The main reason is that such models were designed to protect the access to explicit data (e.g. tables, attributes, views, etc), whereas data mining tasks deal with the discovery of implicit data (e.g. patterns). In this paper, we take a first step toward an access control model for ensuring privacy in relational data mining, notably in multi-relational association rules (MRAR). In this model, users associated with different mining access levels, even using the same algorithm, are allowed to mine different sets of association rules. We provide the groundwork to build our access control model over existing technologies and discuss some directions for future work.
In this paper, we introduce an efficient method for the dynamic maintenance of wavelet-based histograms (and other transform-based histograms). Previous work has shown that wavelet-based histograms provide more accura...
详细信息
ISBN:
(纸本)1558607153
In this paper, we introduce an efficient method for the dynamic maintenance of wavelet-based histograms (and other transform-based histograms). Previous work has shown that wavelet-based histograms provide more accurate selectivity estimation than traditional histograms, such as equi-depth histograms. But since wavelet-based histograms are built by a nontrivial mathematical procedure, namely, wavelet transform decomposition, it is hard to maintain the accuracy of the histogram when the underlying data distribution changes over time. In particular, simple techniques, such as split and merge, which works well for equi-depth histograms, and updating a fixed set of wavelet coefficients, are not suitable here. We propose a novel approach based upon probabilistic counting and sampling to maintain waveletbased histograms with very little online time and space costs. The accuracy of our method is robust to changing data distributions, and we get a considerable improvement over previous methods for updating transform-based histograms. A very nice feature of our method is that it can be extended naturally to maintain multidimensional wavelet-based histograms, while traditional multidimensional histograms can be less accurate and prohibitively expensive to build and maintain.
暂无评论