Sciweavers

250 search results - page 27 / 50
» Lost source provenance
Sort
View
ICPR
2004
IEEE
14 years 8 months ago
Probabilistic Object Tracking Using Multiple Features
We present a generic tracker which can handle a variety of different objects. For this purpose, groups of low-level features like interest points, edges, homogeneous and textured ...
David Serby, Esther Koller-Meier, Luc J. Van Gool
WWW
2005
ACM
14 years 8 months ago
Signing individual fragments of an RDF graph
Being able to determine the provenience of statements is a fundamental step in any SW trust modeling. We propose a methodology that allows signing of small groups of RDF statement...
Giovanni Tummarello, Christian Morbidoni, Paolo Pu...
ESSOS
2009
Springer
14 years 2 months ago
MEDS: The Memory Error Detection System
Abstract. Memory errors continue to be a major source of software failure. To address this issue, we present MEDS (Memory Error Detection System), a system for detecting memory err...
Jason Hiser, Clark L. Coleman, Michele Co, Jack W....
SCALESPACE
2009
Springer
14 years 2 months ago
On Level-Set Type Methods for Recovering Piecewise Constant Solutions of Ill-Posed Problems
We propose a regularization method for solving ill-posed problems, under the assumption that the solutions are piecewise constant functions with unknown level sets and unknown leve...
Adriano DeCezaro, Antonio Leitão, Xue-Cheng...
ICDCSW
2006
IEEE
14 years 1 months ago
Semantic Data Extraction for B2B Integration
Business-to-business (B2B) data exchange and integration is a common daily operation in today’s organizations. These operations are crucial since they affect organizations’ ca...
Bruno Silva, Jorge Cardoso