Sciweavers

338 search results - page 47 / 68
» Numerical constraints on XML data
Sort
View
ICFEM
2010
Springer
13 years 6 months ago
Loop Invariant Synthesis in a Combined Domain
Abstract. Automated verification of memory safety and functional correctness for heap-manipulating programs has been a challenging task, especially when dealing with complex data ...
Shengchao Qin, Guanhua He, Chenguang Luo, Wei-Ngan...
ECCV
2008
Springer
14 years 9 months ago
Shadows in Three-Source Photometric Stereo
Shadows are one of the most significant difficulties of the photometric stereo method. When four or more images are available, local surface orientation is overdetermined and the s...
Carlos Hernández, George Vogiatzis, Roberto...
ML
2008
ACM
13 years 7 months ago
Discovering significant patterns
Pattern discovery techniques, such as association rule discovery, explore large search spaces of potential patterns to find those that satisfy some user-specified constraints. Due...
Geoffrey I. Webb
ICASSP
2009
IEEE
13 years 5 months ago
Weighted nonnegative matrix factorization
Nonnegative matrix factorization (NMF) is a widely-used method for low-rank approximation (LRA) of a nonnegative matrix (matrix with only nonnegative entries), where nonnegativity...
Yong-Deok Kim, Seungjin Choi
AUSDM
2008
Springer
188views Data Mining» more  AUSDM 2008»
13 years 9 months ago
Priority Driven K-Anonymisation for Privacy Protection
Given the threat of re-identification in our growing digital society, guaranteeing privacy while providing worthwhile data for knowledge discovery has become a difficult problem. ...
Xiaoxun Sun, Hua Wang, Jiuyong Li