Sciweavers

720 search results - page 118 / 144
» Incremental XPath evaluation
Sort
View
CVPR
2010
IEEE
13 years 9 months ago
A probabilistic framework for joint segmentation and tracking
Most tracking algorithms implicitly apply a coarse segmentation of each target object using a simple mask such as a rectangle or an ellipse. Although convenient, such coarse segme...
Chad Aeschliman, Johnny Park, Avinash C. Kak
AEI
2010
136views more  AEI 2010»
13 years 8 months ago
Bridging the sense-reasoning gap: DyKnow - Stream-based middleware for knowledge processing
nizing multiple forms of information and knowledge processing on different levels of abstraction in a structured and principled manner. We propose knowledge processing middleware a...
Fredrik Heintz, Jonas Kvarnström, Patrick Doh...
AI
2008
Springer
13 years 8 months ago
Generalised arc consistency for the AllDifferent constraint: An empirical survey
The AllDifferent constraint is a crucial component of any constraint toolkit, language or solver, since it is very widely used in a variety of constraint models. The literature con...
Ian P. Gent, Ian Miguel, Peter Nightingale
ARTMED
2006
75views more  ARTMED 2006»
13 years 8 months ago
Semi-automatic learning of simple diagnostic scores utilizing complexity measures
Objective: Knowledge acquisition and maintenance in medical domains with a large application domain ontology is a difficult task. To reduce knowledge elicitation costs, semiautoma...
Martin Atzmüller, Joachim Baumeister, Frank P...
ESE
2008
112views Database» more  ESE 2008»
13 years 8 months ago
"Cloning considered harmful" considered harmful: patterns of cloning in software
Literature on the topic of code cloning often asserts that duplicating code within a software system is a bad practice, that it causes harm to the system's design and should b...
Cory Kapser, Michael W. Godfrey