Sciweavers

945 search results - page 163 / 189
» Detective Information Flow Analysis for Business Processes
Sort
View
BIOADIT
2004
Springer
14 years 2 months ago
Explaining Low-Level Brightness-Contrast Illusions Using Disinhibition
Conventional Difference of Gaussian (DOG) filter is usually used to model the early stage of visual processing. However, convolution operation used with DOG does not explicitly a...
Yingwei Yu, Takashi Yamauchi, Yoonsuck Choe
SIGMOD
2004
ACM
119views Database» more  SIGMOD 2004»
14 years 8 months ago
Lazy Query Evaluation for Active XML
In this paper, we study query evaluation on Active XML documents (AXML for short), a new generation of XML documents that has recently gained popularity. AXML documents are XML do...
Serge Abiteboul, Omar Benjelloun, Bogdan Cautis, I...
CEAS
2007
Springer
14 years 2 months ago
Hardening Fingerprinting by Context
Near-duplicate detection is not only an important pre and post processing task in Information Retrieval but also an effective spam-detection technique. Among different approache...
Aleksander Kolcz, Abdur Chowdhury
CVPR
2007
IEEE
14 years 10 months ago
3D Occlusion Inference from Silhouette Cues
We consider the problem of detecting and accounting for the presence of occluders in a 3D scene based on silhouette cues in video streams obtained from multiple, calibrated views....
Jean-Sébastien Franco, Li Guan, Marc Pollef...
SIGMOD
1999
ACM
183views Database» more  SIGMOD 1999»
14 years 28 days ago
OPTICS: Ordering Points To Identify the Clustering Structure
Cluster analysis is a primary method for database mining. It is either used as a stand-alone tool to get insight into the distribution of a data set, e.g. to focus further analysi...
Mihael Ankerst, Markus M. Breunig, Hans-Peter Krie...