Sciweavers

216 search results - page 21 / 44
» Explaining User Errors in Knowledge Base Completion
Sort
View
SIGMOD
1997
ACM
146views Database» more  SIGMOD 1997»
14 years 1 months ago
Concurrency and Recovery in Generalized Search Trees
This paper presents general algorithms for concurrency control in tree-based access methods as well as a recovery protocol and a mechanism for ensuring repeatable read. The algori...
Marcel Kornacker, C. Mohan, Joseph M. Hellerstein
JODL
2000
76views more  JODL 2000»
13 years 8 months ago
Strategy-based interactive cluster visualization for information retrieval
Abstract. In this paper we investigate a general purpose interactive information organization system. The system organizes documents by placing them into 1-, 2-, or 3-dimensional s...
Anton Leuski, James Allan
CDC
2009
IEEE
170views Control Systems» more  CDC 2009»
14 years 1 months ago
Adaptive constraint-filtering method and its application to GPS positioning
—To deal with the estimation problem for systems subject to constraints while the corresponding noise processes are not completely known, the adaptive constraint-filtering method...
Tsai-Hsin Chang, Li-Sheng Wang, Fan-Ren Chang
LOPSTR
2001
Springer
14 years 1 months ago
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols
In this paper we define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of prin...
Giorgio Delzanno, Sandro Etalle
ICASSP
2010
IEEE
13 years 7 months ago
Identification of linear systems in canonical form through an EM framework
Least-squares estimation has always been the main approach when applying prediction error methods (PEM) in the identification of linear dynamical systems. Regardless of the estim...
Pavlos Papadopoulos, Vassilis Digalakis