Sciweavers

1565 search results - page 201 / 313
» An unlikely result
Sort
View
CORR
2010
Springer
157views Education» more  CORR 2010»
13 years 9 months ago
Active Integrity Constraints and Revision Programming
We study active integrity constraints and revision programming, two formalisms designed to describe integrity constraints on databases and to specify policies on preferred ways to...
Luciano Caroprese, Miroslaw Truszczynski
CORR
2010
Springer
133views Education» more  CORR 2010»
13 years 9 months ago
Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI
—In this paper, we investigate methods for reducing the likelihood that a message transmitted between two multiantenna nodes is intercepted by an undetected eavesdropper. In part...
Amitav Mukherjee, A. Lee Swindlehurst
DIS
2010
Springer
13 years 9 months ago
Mining Class-Correlated Patterns for Sequence Labeling
Sequence labeling is the task of assigning a label sequence to an observation sequence. Since many methods to solve this problem depend on the specification of predictive features...
Thomas Hopf, Stefan Kramer
ECCV
2010
Springer
13 years 9 months ago
Element-Wise Factorization for N-View Projective Reconstruction
Sturm-Triggs iteration is a standard method for solving the projective factorization problem. Like other iterative algorithms, this method suffers from some common drawbacks such ...
Yuchao Dai, Hongdong Li, Mingyi He
ICCBR
2010
Springer
13 years 9 months ago
Applying Machine Translation Evaluation Techniques to Textual CBR
The need for automated text evaluation is common to several AI disciplines. In this work, we explore the use of Machine Translation (MT) evaluation metrics for Textual Case Based R...
Ibrahim Adeyanju, Nirmalie Wiratunga, Robert Lothi...