Sciweavers

1167 search results - page 39 / 234
» Substitution-closed pattern classes
Sort
View
VLDB
2003
ACM
141views Database» more  VLDB 2003»
14 years 8 months ago
Computing complete answers to queries in the presence of limited access patterns
In data applications such as information integration, there can be limited access patterns to relations, i.e., binding patterns require values to be specified for certain attribut...
Chen Li
PODS
2004
ACM
98views Database» more  PODS 2004»
14 years 8 months ago
Processing First-Order Queries under Limited Access Patterns
We study the problem of answering queries over sources with limited access patterns. Given a first-order query Q, the problem is to decide whether there is an equivalent query whi...
Alan Nash, Bertram Ludäscher
EDBT
2004
ACM
155views Database» more  EDBT 2004»
14 years 8 months ago
Processing Unions of Conjunctive Queries with Negation under Limited Access Patterns
We study the problem of answering queries over sources with limited access patterns. The problem is to decide whether a given query Q is feasible, i.e., equivalent to an executable...
Alan Nash, Bertram Ludäscher
SIGCSE
2005
ACM
117views Education» more  SIGCSE 2005»
14 years 2 months ago
Design patterns for parsing
We provide a systematic transformation of an LL(1) grammar to an object model that consists of · an object structure representing the non-terminal symbols and their corresponding...
Dung Zung Nguyen, Mathias Ricken, Stephen B. Wong
CVPR
1996
IEEE
14 years 18 days ago
Pattern Rejection
The e ciency of pattern recognition is particularly crucial in two scenarios; whenever there are a large number of classes to discriminate, and, whenever recognition must be perfo...
Simon Baker, Shree K. Nayar