Sciweavers

1029 search results - page 71 / 206
» Dependence Anti Patterns
Sort
View
PODS
2003
ACM
151views Database» more  PODS 2003»
14 years 9 months ago
Feasible itemset distributions in data mining: theory and application
Computing frequent itemsets and maximally frequent itemsets in a database are classic problems in data mining. The resource requirements of all extant algorithms for both problems...
Ganesh Ramesh, William Maniatty, Mohammed Javeed Z...
PADL
2010
Springer
14 years 5 months ago
Conversion by Evaluation
Abstract. We show how testing convertibility of two types in dependently typed systems can advantageously be implemented instead untyped normalization by evaluation, thereby reusin...
Mathieu Boespflug
ATS
2009
IEEE
113views Hardware» more  ATS 2009»
14 years 3 months ago
Deterministic Algorithms for ATPG under Leakage Constraints
—Measuring the steady state leakage current (IDDQ) is very successful in detecting faults not discovered by standard fault models. But vector dependencies of IDDQ decrease the re...
Gorschwin Fey
ICAPR
2009
Springer
14 years 3 months ago
Saving Electrical Power in a Surveillance Environment
—This paper proposes a smart video surveillance system with real-time moving object (primarily human) detection and identification for solving the problem of excessive power con...
Souvik Sen, Amit Kumar Das, Shyama Prosad Chowdhur...
ISMAR
2008
IEEE
14 years 3 months ago
Dynamic gyroscope fusion in Ubiquitous Tracking environments
Ubiquitous Tracking (Ubitrack) setups, consisting of many previously unknown sensors, offer many possibilities to perform sensor fusion in order to increase robustness and accurac...
Daniel Pustka, Gudrun Klinker