Sciweavers

33356 search results - page 6589 / 6672
» Models of Continual Computation
Sort
View
ICRA
2002
IEEE
104views Robotics» more  ICRA 2002»
14 years 4 months ago
Improbability Filtering for Rejecting False Positives
—In this paper we describe a novel approach, called improbability filtering, to rejecting false-positive observations from degrading the tracking performance of an Extended Kalma...
Brett Browning, Michael H. Bowling, Manuela M. Vel...
SIGECOM
2010
ACM
156views ECommerce» more  SIGECOM 2010»
14 years 4 months ago
Robust mechanisms for risk-averse sellers
The existing literature on optimal auctions focuses on optimizing the expected revenue of the seller, and is appropriate for risk-neutral sellers. In this paper, we identify good ...
Mukund Sundararajan, Qiqi Yan
SIGMOD
2010
ACM
324views Database» more  SIGMOD 2010»
14 years 4 months ago
Similarity search and locality sensitive hashing using ternary content addressable memories
Similarity search methods are widely used as kernels in various data mining and machine learning applications including those in computational biology, web search/clustering. Near...
Rajendra Shinde, Ashish Goel, Pankaj Gupta, Debojy...
SIGMOD
2010
ACM
170views Database» more  SIGMOD 2010»
14 years 4 months ago
Querying data provenance
Many advanced data management operations (e.g., incremental maintenance, trust assessment, debugging schema mappings, keyword search over databases, or query answering in probabil...
Grigoris Karvounarakis, Zachary G. Ives, Val Tanne...
APWEB
2010
Springer
14 years 4 months ago
Optimizing Query Processing for the Hidden Web
Abstract. The term Deep Web (sometimes also called Hidden Web) refers to the data content that is created dynamically as the result of a specific search on the Web. In this respec...
Andrea Calì, Davide Martinenghi
« Prev « First page 6589 / 6672 Last » Next »