Sciweavers

3758 search results - page 213 / 752
» A Complete Subsumption Algorithm
Sort
View
107
Voted
ICDM
2002
IEEE
70views Data Mining» more  ICDM 2002»
15 years 7 months ago
Progressive Modeling
Presently, inductive learning is still performed in a frustrating batch process. The user has little interaction with the system and no control over the final accuracy and traini...
Wei Fan, Haixun Wang, Philip S. Yu, Shaw-hwa Lo, S...
ICDT
2007
ACM
105views Database» more  ICDT 2007»
15 years 6 months ago
Unlocking Keys for XML Trees
Abstract. We review key constraints in the context of XML as introduced by Buneman et al. We show that one of the proposed inference rules is not sound in general, and the axiomati...
Sven Hartmann, Sebastian Link
COMPSAC
2004
IEEE
15 years 6 months ago
Adaptive Time-Critical Resource Management Using Time/Utility Functions: Past, Present, and Future
Time/utility function time constraints (or TUFs) and utility accrual (UA) scheduling optimality criteria, constitute, arguably, the most effective and broadest approach for adapti...
Peng Li, Binoy Ravindran, E. Douglas Jensen
FGR
2004
IEEE
220views Biometrics» more  FGR 2004»
15 years 6 months ago
Integration of 2D and 3D Images for Enhanced Face Authentication
This paper presents a complete face authentication system integrating 2D intensity and 3D range data, based on a low-cost, real-time structured light sensor. Novel algorithms are ...
Filareti Tsalakanidou, Sotiris Malassiotis, Michae...
AAAI
2008
15 years 4 months ago
Minimizing Disk I/O in Two-Bit Breadth-First Search
We present a breadth-first search algorithm, two-bit breadthfirst search (TBBFS), which requires only two bits for each state in the problem space. TBBFS can be parallelized in se...
Richard E. Korf