Sciweavers

356 search results - page 50 / 72
» A Most General Edge Elimination Polynomial - Thickening of E...
Sort
View
93
Voted
SECPERU
2006
IEEE
15 years 6 months ago
An Effective Approach for Accurate Estimation of Trust of Distant Information Sources in the Semantic Web
To assess the trustworthiness of the information published in the World Wide Web referrals are often employed. This is due to the fact that most information sources are visited on...
Vangelis G. Bintzios, Thanasis G. Papaioannou, Geo...
81
Voted
MSR
2005
ACM
15 years 6 months ago
SCQL: a formal model and a query language for source control repositories
Source Control Repositories are used in most software projects to store revisions to source code files. These repositories operate at the file level and support multiple users. ...
Abram Hindle, Daniel M. Germán
117
Voted
GIAE
2004
Springer
187views Mathematics» more  GIAE 2004»
15 years 5 months ago
nD Object Representation and Detection from Single 2D Line Drawing
In this paper, we propose the wireframe representation of nD object, which is a single 2D line drawing. A wireframe model of an nD object is composed of a set of edges connecting a...
Hongbo Li, Quan Wang, Lina Zhao, Ying Chen, Lei Hu...
TIP
1998
162views more  TIP 1998»
15 years 3 days ago
Variational image segmentation using boundary functions
Abstract—A general variational framework for image approximation and segmentation is introduced. By using a continuous “line-process” to represent edge boundaries, it is poss...
Gary A. Hewer, Charles S. Kenney, B. S. Manjunath
POPL
2007
ACM
16 years 23 days ago
Cork: dynamic memory leak detection for garbage-collected languages
A memory leak in a garbage-collected program occurs when the program inadvertently maintains references to objects that it no longer needs. Memory leaks cause systematic heap grow...
Maria Jump, Kathryn S. McKinley