Sciweavers

2917 search results - page 91 / 584
» Satisfying Interaction Constraints
Sort
View
FTCS
1998
114views more  FTCS 1998»
13 years 10 months ago
Verification of a Safety-Critical Railway Interlocking System with Real-Time Constraints
Ensuring the correctness of computer systems used in lifecritical applications is very difficult. The most commonly used verification methods, simulation and testing, are not exha...
Vicky Hartonas-Garmhausen, Sérgio Vale Agui...
KDD
2007
ACM
152views Data Mining» more  KDD 2007»
14 years 9 months ago
Efficient incremental constrained clustering
Clustering with constraints is an emerging area of data mining research. However, most work assumes that the constraints are given as one large batch. In this paper we explore the...
Ian Davidson, S. S. Ravi, Martin Ester
SIGMOD
2004
ACM
173views Database» more  SIGMOD 2004»
14 years 9 months ago
Relaxed Currency and Consistency: How to Say "Good Enough" in SQL
Despite the widespread and growing use of asynchronous copies to improve scalability, performance and availability, this practice still lacks a firm semantic foundation. Applicati...
Hongfei Guo, Jonathan Goldstein, Per-Åke Lar...
CVPR
2010
IEEE
1171views Computer Vision» more  CVPR 2010»
14 years 5 months ago
Geodesic Star Convexity for Interactive Image Segmentation
In this paper we introduce a new shape constraint for interactive image segmentation. It is an extension of Veksler's star-convexity prior, in two ways: from a single star to ...
Varun Gulshan, Carsten Rother, Antonio Criminisi, ...
HICSS
2006
IEEE
127views Biometrics» more  HICSS 2006»
14 years 3 months ago
Processing of Data Streams with Prediction Functions
Networks of sensors arise naturally in many different fields, from industrial applications (e.g., monitoring of environmental parameters in a chemical plant) to surveillance appl...
Sergio Ilarri, Ouri Wolfson, Eduardo Mena, Arantza...