Sciweavers

1076 search results - page 214 / 216
» Operations on proofs and labels
Sort
View
PVLDB
2010
115views more  PVLDB 2010»
13 years 5 months ago
ROXXI: Reviving witness dOcuments to eXplore eXtracted Information
In recent years, there has been considerable research on information extraction and constructing RDF knowledge bases. In general, the goal is to extract all relevant information f...
Shady Elbassuoni, Katja Hose, Steffen Metzger, Ral...
SIAMSC
2010
141views more  SIAMSC 2010»
13 years 5 months ago
An Iterative Method for Edge-Preserving MAP Estimation When Data-Noise Is Poisson
In numerous applications of image processing, e.g. astronomical and medical imaging, data-noise is well-modeled by a Poisson distribution. This motivates the use of the negative-lo...
Johnathan M. Bardsley, John Goldes
GLOBECOM
2010
IEEE
13 years 5 months ago
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...
BMCBI
2010
133views more  BMCBI 2010»
13 years 4 months ago
Initial steps towards a production platform for DNA sequence analysis on the grid
Background: Bioinformatics is confronted with a new data explosion due to the availability of high throughput DNA sequencers. Data storage and analysis becomes a problem on local ...
Angela C. M. Luyf, Barbera D. C. van Schaik, Miche...
SLOGICA
2011
13 years 2 months ago
Logics for Qualitative Inductive Generalization
The paper contains a survey of (mainly unpublished) adaptive logics of inductive generalization. These defeasible logics are precise formulations of certain methods. Some attentio...
Diderik Batens