Sciweavers

1057 search results - page 188 / 212
» its 1998
Sort
View
TC
1998
13 years 8 months ago
Propagating Integrity Information among Interrelated Databases
Data integrity policies often require that quality and integrity metadata be generated and communicated to potential users. However, in data warehouses, federations, and other mul...
Arnon Rosenthal, Edward Sciore
TON
1998
103views more  TON 1998»
13 years 7 months ago
Using name-based mappings to increase hit rates
—Clusters of identical intermediate servers are often created to improve availability and robustness in many domains. The use of proxy servers for the World Wide Web (WWW) and of...
David Thaler, Chinya V. Ravishankar
NECO
2007
150views more  NECO 2007»
13 years 7 months ago
Reinforcement Learning, Spike-Time-Dependent Plasticity, and the BCM Rule
Learning agents, whether natural or artificial, must update their internal parameters in order to improve their behavior over time. In reinforcement learning, this plasticity is ...
Dorit Baras, Ron Meir
CVPR
1998
IEEE
14 years 9 months ago
Incorporating Illumination Constraints in Deformable Models
In this paper we present a method for the integration of nonlinear holonomic constraints in deformable models and its application to the problems of shape and illuminant direction...
Dimitris Samaras, Dimitris N. Metaxas
ICIP
1998
IEEE
14 years 9 months ago
Reversing Motion Vector Fields
With the popular use of digital video (VCD, DVD, video conferencing, digital broadcasting system, digital TV and video editing), video streaming technology becomes much more impor...
Susie J. Wee