Sciweavers

16430 search results - page 3161 / 3286
» On Computable Tree Functions
Sort
View
SIGMOD
2004
ACM
209views Database» more  SIGMOD 2004»
14 years 8 months ago
MAIDS: Mining Alarming Incidents from Data Streams
Real-time surveillance systems, network and telecommunication systems, and other dynamic processes often generate tremendous (potentially infinite) volume of stream data. Effectiv...
Y. Dora Cai, David Clutter, Greg Pape, Jiawei Han,...
PODS
2004
ACM
158views Database» more  PODS 2004»
14 years 8 months ago
Composing Schema Mappings: Second-Order Dependencies to the Rescue
A schema mapping is a specification that describes how data structured under one schema (the source schema) is to be transformed into data structured under a different schema (the...
Ronald Fagin, Phokion G. Kolaitis, Lucian Popa, Wa...
EDBT
2008
ACM
169views Database» more  EDBT 2008»
14 years 8 months ago
BioScout: a life-science query monitoring system
Scientific data are available through an increasing number of heterogeneous, independently evolving, sources. Although the sources themselves are independently evolving, the data ...
Anastasios Kementsietsidis, Frank Neven, Dieter Va...
ICIAP
2001
Springer
14 years 8 months ago
Bayesian Face Recognition with Deformable Image Models
We propose a novel representation for characterizing image differences using a deformable technique for obtaining pixel-wise correspondences. This representation, which is based o...
Baback Moghaddam, Chahab Nastar, Alex Pentland
ICSE
2004
IEEE-ACM
14 years 8 months ago
Skoll: Distributed Continuous Quality Assurance
Quality assurance (QA) tasks, such as testing, profiling, and performance evaluation, have historically been done in-house on developer-generated workloads and regression suites. ...
Atif M. Memon, Adam A. Porter, Cemal Yilmaz, Adith...
« Prev « First page 3161 / 3286 Last » Next »