Sciweavers

88 search results - page 14 / 18
» Feature analysis through information granulation and fuzzy s...
Sort
View
DBPL
1989
Springer
165views Database» more  DBPL 1989»
13 years 11 months ago
Support for Data-Intensive Applications: Conceptual Design and Software Development
In the process of developing an Information System, one passes through stages that include requirements gathering, design specification, and software implementation. The purpose ...
Alexander Borgida, John Mylopoulos, Joachim W. Sch...
KDD
2008
ACM
172views Data Mining» more  KDD 2008»
14 years 8 months ago
Structured metric learning for high dimensional problems
The success of popular algorithms such as k-means clustering or nearest neighbor searches depend on the assumption that the underlying distance functions reflect domain-specific n...
Jason V. Davis, Inderjit S. Dhillon
WIOPT
2010
IEEE
13 years 5 months ago
Performance tuning of Infrastructure-Mode wireless LANs
—Conventional wisdom about 802.11 WLANs dictates that as the number of active users increases, the contention windows (CW) of all the contending users needs to increase to preven...
Yigal Bejerano, Hyoung-Gyu Choi, Seung-Jae Han, Th...
IJRR
2008
136views more  IJRR 2008»
13 years 7 months ago
Image-based Visual Servoing with Central Catadioptric Cameras
: This paper presents an image-based visual servoing strategy for the autonomous navigation of a mobile holonomic robot from a current toward a desired pose, specified only through...
Gian Luca Mariottini, Domenico Prattichizzo
PLDI
2005
ACM
14 years 1 months ago
Checking type safety of foreign function calls
We present a multi-lingual type inference system for checking type safety across a foreign function interface. The goal of our system is to prevent foreign function calls from int...
Michael Furr, Jeffrey S. Foster