Sciweavers

1029 search results - page 71 / 206
» Dependence Anti Patterns
Sort
View
120
Voted
PODS
2003
ACM
151views Database» more  PODS 2003»
16 years 2 months ago
Feasible itemset distributions in data mining: theory and application
Computing frequent itemsets and maximally frequent itemsets in a database are classic problems in data mining. The resource requirements of all extant algorithms for both problems...
Ganesh Ramesh, William Maniatty, Mohammed Javeed Z...
PADL
2010
Springer
15 years 11 months ago
Conversion by Evaluation
Abstract. We show how testing convertibility of two types in dependently typed systems can advantageously be implemented instead untyped normalization by evaluation, thereby reusin...
Mathieu Boespflug
99
Voted
ATS
2009
IEEE
113views Hardware» more  ATS 2009»
15 years 9 months ago
Deterministic Algorithms for ATPG under Leakage Constraints
—Measuring the steady state leakage current (IDDQ) is very successful in detecting faults not discovered by standard fault models. But vector dependencies of IDDQ decrease the re...
Gorschwin Fey
119
Voted
ICAPR
2009
Springer
15 years 9 months ago
Saving Electrical Power in a Surveillance Environment
—This paper proposes a smart video surveillance system with real-time moving object (primarily human) detection and identification for solving the problem of excessive power con...
Souvik Sen, Amit Kumar Das, Shyama Prosad Chowdhur...
144
Voted
ISMAR
2008
IEEE
15 years 9 months ago
Dynamic gyroscope fusion in Ubiquitous Tracking environments
Ubiquitous Tracking (Ubitrack) setups, consisting of many previously unknown sensors, offer many possibilities to perform sensor fusion in order to increase robustness and accurac...
Daniel Pustka, Gudrun Klinker