Sciweavers

1323 search results - page 92 / 265
» Updatable Security Views
Sort
View
106
Voted
ISNN
2007
Springer
15 years 8 months ago
Neural Networks Training with Optimal Bounded Ellipsoid Algorithm
Abstract. Compared to normal learning algorithms, for example backpropagation, the optimal bounded ellipsoid (OBE) algorithm has some better properties, such as faster convergence,...
José de Jesús Rubio, Wen Yu
97
Voted
ICDE
2006
IEEE
122views Database» more  ICDE 2006»
15 years 8 months ago
Pragmatics and Open Problems for Inter-schema Constraint Theory
We consider pragmatic issues in applying constraint-based theories (such as that developed for data exchange) to a variety of problems. We identify disconnects between theoreticia...
Arnon Rosenthal, Leonard J. Seligman
IEEECGIV
2006
IEEE
15 years 8 months ago
Incremental Voxel Colouring by Ray Traversal
Image based reconstruction from multiple views is an interesting challenge. Recently methods of optimisation based voxel colouring have appeared, which make use of incremental vis...
O. Batchelor, R. Mukundan, R. Green
CN
1999
102views more  CN 1999»
15 years 2 months ago
Web-Enabled Smart Card for Ubiquitous Access of Patient's Medical Record
The combined benefits of smart card to support mobility in a pocket coupled with the ubiquitous access of Web technology, present a new paradigm for medical information access sys...
Alvin T. S. Chan
TCS
1998
15 years 2 months ago
Algebraic Translations, Correctness and Algebraic Compiler Construction
Algebraic translation methods are argued for in many fields of science. Several examples will be considered: from the field of compiler construction, database updates, concurren...
Theo M. V. Janssen