Sciweavers

32545 search results - page 6505 / 6509
» Data Structures and Algorithms
Sort
View
ICDE
2012
IEEE
291views Database» more  ICDE 2012»
12 years 7 months ago
Efficiently Monitoring Top-k Pairs over Sliding Windows
Top-k pairs queries have received significant attention by the research community. k-closest pairs queries, k-furthest pairs queries and their variants are among the most well stu...
Zhitao Shen, Muhammad Aamir Cheema, Xuemin Lin, We...
CVPR
2008
IEEE
13 years 8 months ago
Tracking distributions with an overlap prior
Recent studies have shown that embedding similarity/dissimilarity measures between distributions in the variational level set framework can lead to effective object segmentation/t...
Ismail Ben Ayed, Shuo Li, Ian G. Ross
SMA
2009
ACM
132views Solid Modeling» more  SMA 2009»
14 years 2 months ago
Robust Voronoi-based curvature and feature estimation
Many algorithms for shape analysis and shape processing rely on accurate estimates of differential information such as normals and curvature. In most settings, however, care must...
Quentin Mérigot, Maks Ovsjanikov, Leonidas ...
CORR
2012
Springer
170views Education» more  CORR 2012»
12 years 4 months ago
What Cannot be Learned with Bethe Approximations
We address the problem of learning the parameters in graphical models when inference is intractable. A common strategy in this case is to replace the partition function with its B...
Uri Heinemann, Amir Globerson
POPL
2012
ACM
12 years 4 months ago
Probabilistic relational reasoning for differential privacy
Differential privacy is a notion of confidentiality that protects the privacy of individuals while allowing useful computations on their private data. Deriving differential priva...
Gilles Barthe, Boris Köpf, Federico Olmedo, S...
« Prev « First page 6505 / 6509 Last » Next »