Sciweavers

313 search results - page 49 / 63
» Using Recon for Data Cleaning
Sort
View
SIGMOD
2010
ACM
217views Database» more  SIGMOD 2010»
14 years 9 days ago
Mining knowledge from databases: an information network analysis approach
Most people consider a database is merely a data repository that supports data storage and retrieval. Actually, a database contains rich, inter-related, multi-typed data and infor...
Jiawei Han, Yizhou Sun, Xifeng Yan, Philip S. Yu
CVPR
2008
IEEE
14 years 9 months ago
Randomized trees for human pose detection
This paper addresses human pose recognition from video sequences by formulating it as a classification problem. Unlike much previous work we do not make any assumptions on the ava...
Grégory Rogez, Jonathan Rihan, Srikumar Ram...
ICRA
2009
IEEE
140views Robotics» more  ICRA 2009»
14 years 2 months ago
A miniature ceiling walking robot with flat tacky elastomeric footpads
—In this paper, the design, analysis, and development of a sixteen-legged palm-sized climbing robot using flat bulk tacky elastomer adhesives as an attachment method is presente...
Ozgur Unver, Metin Sitti
ECOWS
2009
Springer
14 years 2 months ago
Remote Batch Invocation for Web Services: Document-Oriented Web Services with Object-Oriented Interfaces
—The Web Service Description Language defines a service as a procedure whose inputs and outputs are structured XML data values, sometimes called documents. In this paper we argu...
Ali Ibrahim, Marc Fisher II, William R. Cook, Eli ...
SIGIR
2006
ACM
14 years 1 months ago
Near-duplicate detection by instance-level constrained clustering
For the task of near-duplicated document detection, both traditional fingerprinting techniques used in database community and bag-of-word comparison approaches used in information...
Hui Yang, James P. Callan