Sciweavers

5758 search results - page 1115 / 1152
» Anonymity-preserving data collection
Sort
View
GIS
2009
ACM
14 years 9 months ago
From GPS Traces to a Routable Road Map
This paper presents a method for automatically converting raw GPS traces from everyday vehicles into a routable road network. The method begins by smoothing raw GPS traces using a...
Lili Cao, John Krumm
GIS
2006
ACM
14 years 9 months ago
Exploiting a page-level upper bound for multi-type nearest neighbor queries
Given a query point and a collection of spatial features, a multi-type nearest neighbor (MTNN) query finds the shortest tour for the query point such that only one instance of eac...
Xiaobin Ma, Shashi Shekhar, Hui Xiong, Pusheng Zha...
ICML
2004
IEEE
14 years 9 months ago
Generalized low rank approximations of matrices
The problem of computing low rank approximations of matrices is considered. The novel aspect of our approach is that the low rank approximations are on a collection of matrices. W...
Jieping Ye
SIGSOFT
2007
ACM
14 years 9 months ago
Does a programmer's activity indicate knowledge of code?
The practice of software development can likely be improved if an externalized model of each programmer's knowledge of a particular code base is available. Some tools already...
Thomas Fritz, Gail C. Murphy, Emily Hill
SIGSOFT
2007
ACM
14 years 9 months ago
Training on errors experiment to detect fault-prone software modules by spam filter
The fault-prone module detection in source code is of importance for assurance of software quality. Most of previous fault-prone detection approaches are based on software metrics...
Osamu Mizuno, Tohru Kikuno
« Prev « First page 1115 / 1152 Last » Next »