Sciweavers

223 search results - page 31 / 45
» Conditional functional dependencies for capturing data incon...
Sort
View
IPAW
2010
13 years 6 months ago
Securing Provenance-Based Audits
Given the significant increase of on-line services that require personal information from users, the risk that such information is misused has become an important concern. In such ...
Rocío Aldeco-Pérez, Luc Moreau
CVPR
2011
IEEE
13 years 5 months ago
Learning Effective Human Pose Estimation from Inaccurate Annotation
The task of 2-D articulated human pose estimation in natural images is extremely challenging due to the high level of variation in human appearance. These variations arise from di...
Sam Johnson, Mark Everingham
JECR
2002
120views more  JECR 2002»
13 years 8 months ago
Strategic Connectivity in Extended Enterprise Networks
Extended enterprises are networks of organizations interconnected to exchange critical resources, such as raw materials, labor, access to markets, specialized skills and knowledge...
John Tillquist
ALGOSENSORS
2004
Springer
14 years 1 months ago
Multi: A Hybrid Adaptive Dissemination Protocol for Wireless Sensor Networks
Abstract. Data dissemination (routing) is a basic function in wireless sensor networks. Dissemination algorithms for those networks depend on the characteristics of the application...
Carlos Mauricio S. Figueiredo, Eduardo Freire Naka...
ICDE
2010
IEEE
212views Database» more  ICDE 2010»
13 years 8 months ago
Cleansing uncertain databases leveraging aggregate constraints
— Emerging uncertain database applications often involve the cleansing (conditioning) of uncertain databases using additional information as new evidence for reducing the uncerta...
Haiquan Chen, Wei-Shinn Ku, Haixun Wang