Sciweavers

107 search results - page 15 / 22
» Controlling Redundancy in Referring Expressions
Sort
View
DEXA
2008
Springer
176views Database» more  DEXA 2008»
13 years 10 months ago
Inventing Less, Reusing More, and Adding Intelligence to Business Process Modeling
Recently, a variety of workflow patterns has been proposed focusing on specific aspects like control flow, data flow, and resource assignments. Though these patterns are relevant f...
Lucinéia Heloisa Thom, Manfred Reichert, Ca...
ICIP
2008
IEEE
14 years 10 months ago
2D/3D freeview video generation for 3DTV system
In this paper, we present a new method of synthesizing novel views from the virtual cameras in multiview camera configurations for 3DTV system. We introduce a semi N-view & N-...
Dong Bo Min, Donghyun Kim, Kwanghoon Sohn
SP
2006
IEEE
110views Security Privacy» more  SP 2006»
14 years 2 months ago
Privacy and Contextual Integrity: Framework and Applications
Contextual integrity is a conceptual framework for understanding privacy expectations and their implications developed in the literature on law, public policy, and political philo...
Adam Barth, Anupam Datta, John C. Mitchell, Helen ...
SIGMOD
2009
ACM
220views Database» more  SIGMOD 2009»
14 years 8 months ago
Keyword search in databases: the power of RDBMS
Keyword search in relational databases (RDBs) has been extensively studied recently. A keyword search (or a keyword query) in RDBs is specified by a set of keywords to explore the...
Lu Qin, Jeffrey Xu Yu, Lijun Chang
ICSE
2008
IEEE-ACM
14 years 9 months ago
Scalable detection of semantic clones
Several techniques have been developed for identifying similar code fragments in programs. These similar fragments, referred to as code clones, can be used to identify redundant c...
Mark Gabel, Lingxiao Jiang, Zhendong Su