Sciweavers

213 search results - page 26 / 43
» Refining Information Extraction Rules using Data Provenance
Sort
View
KDD
2001
ACM
226views Data Mining» more  KDD 2001»
14 years 8 months ago
Mining from open answers in questionnaire data
Surveys are an important part of marketing and customer relationship management, and open answers (i.e., answers to open questions) in particular may contain valuable information ...
Hang Li, Kenji Yamanishi
PAMI
2007
219views more  PAMI 2007»
13 years 7 months ago
Shape Estimation Using Polarization and Shading from Two Views
—This paper presents a novel method for 3D surface reconstruction that uses polarization and shading information from two views. The method relies on the polarization data acquir...
Gary Atkinson, Edwin R. Hancock
COSIT
2009
Springer
130views GIS» more  COSIT 2009»
14 years 2 months ago
Case-Based Reasoning for Eliciting the Evolution of Geospatial Objects
Abstract.Abstract.Abstract. This paper proposes an automated approach for describing how geospatial objects evolve. We consider geospatial objects whose boundaries and properties c...
Joice Seleme Mota, Gilberto Câmara, Maria Is...
ICSE
2008
IEEE-ACM
14 years 8 months ago
Data flow testing of service-oriented workflow applications
WS-BPEL applications are a kind of service-oriented application. They use XPath extensively to integrate loosely-coupled workflow steps. However, XPath may extract wrong data from...
Lijun Mei, W. K. Chan, T. H. Tse
JASIS
2008
76views more  JASIS 2008»
13 years 7 months ago
Using importance flooding to identify interesting networks of criminal activity
Abstract. In spite of policy concerns and high costs, the law enforcement community is investing heavily in data sharing initiatives. Cross-jurisdictional criminal justice informat...
Byron Marshall, Hsinchun Chen, Siddharth Kaza