Sciweavers

4355 search results - page 812 / 871
» From Interpretation to Compilation
Sort
View
195
Voted
SIGMOD
2006
ACM
126views Database» more  SIGMOD 2006»
16 years 3 months ago
Constraint chaining: on energy-efficient continuous monitoring in sensor networks
Wireless sensor networks have created new opportunities for data collection in a variety of scenarios, such as environmental and industrial, where we expect data to be temporally ...
Adam Silberstein, Jun Yang 0001, Rebecca Braynard
141
Voted
SIGMOD
2004
ACM
142views Database» more  SIGMOD 2004»
16 years 3 months ago
Understanding Web Query Interfaces: Best-Effort Parsing with Hidden Syntax
Recently, the Web has been rapidly "deepened" by many searchable databases online, where data are hidden behind query forms. For modelling and integrating Web databases,...
Zhen Zhang, Bin He, Kevin Chen-Chuan Chang
124
Voted
MOBISYS
2007
ACM
16 years 3 months ago
SmokeScreen: flexible privacy controls for presence-sharing
Presence-sharing is an emerging platform for mobile applications, but presence-privacy remains a challenge. Privacy controls must be flexible enough to allow sharing between both ...
Landon P. Cox, Angela Dalton, Varun Marupadi
137
Voted
CVPR
2009
IEEE
16 years 1 months ago
Visual loop closing using multi-resolution SIFT grids in metric-topological SLAM
We present an image-based Simultaneous Localization and Mapping (SLAM) framework with online, appearanceonly loop closing. We adopt a layered approach with metric maps over small ...
Vivek Pradeep, Gérard G. Medioni, James Wei...
114
Voted
SDM
2009
SIAM
175views Data Mining» more  SDM 2009»
16 years 23 days ago
Low-Entropy Set Selection.
Most pattern discovery algorithms easily generate very large numbers of patterns, making the results impossible to understand and hard to use. Recently, the problem of instead sel...
Hannes Heikinheimo, Jilles Vreeken, Arno Siebes, H...