Sciweavers

1024 search results - page 41 / 205
» Value complete, column complete, predicate complete
Sort
View
CVPR
1997
IEEE
16 years 6 months ago
Pictorial Recognition Using Affine-Invariant Spectral Signatures
This paper describes an efficient approach to pose invariant object recognition employing pictorial recognition of image patches. A complete affine invariance is achieved by a rep...
Jezekiel Ben-Arie, Zhiqian Wang
EUROMICRO
2006
IEEE
15 years 10 months ago
Real-Time Modelling of Distributed Component-Based Applications
This paper presents a modular modelling methodology to formulate the timing behaviour of real-time distributed component-based applications. It allows to build real-time models of...
Patricia López Martínez, Julio L. Me...
ICDT
2001
ACM
110views Database» more  ICDT 2001»
15 years 8 months ago
On Answering Queries in the Presence of Limited Access Patterns
In information-integration systems, source relations often have limitations on access patterns to their data; i.e., when one must provide values for certain attributes of a relatio...
Chen Li, Edward Y. Chang
COCOON
2007
Springer
15 years 8 months ago
Scheduling Selfish Tasks: About the Performance of Truthful Algorithms
This paper deals with problems which fall into the domain of selfish scheduling: a protocol is in charge of building a schedule for a set of tasks without directly knowing their l...
George Christodoulou, Laurent Gourvès, Fann...
CORR
2010
Springer
81views Education» more  CORR 2010»
14 years 11 months ago
Analysis of Agglomerative Clustering
The diameter k-clustering problem is the problem of partitioning a finite subset of Rd into k subsets called clusters such that the maximum diameter of the clusters is minimized. ...
Marcel R. Ackermann, Johannes Blömer, Daniel ...