Sciweavers

4815 search results - page 809 / 963
» A Pattern Approach to Modeling the Provider Selection Proble...
Sort
View
160
Voted
ILP
2007
Springer
15 years 10 months ago
Using ILP to Construct Features for Information Extraction from Semi-structured Text
Machine-generated documents containing semi-structured text are rapidly forming the bulk of data being stored in an organisation. Given a feature-based representation of such data,...
Ganesh Ramakrishnan, Sachindra Joshi, Sreeram Bala...
147
Voted
ALGOSENSORS
2007
Springer
15 years 10 months ago
Counting Targets with Mobile Sensors in an Unknown Environment
Abstract. We consider the problem of counting the number of indistinguishable targets using a simple binary sensing model. Our setting includes an unknown number of point targets i...
Beat Gfeller, Matús Mihalák, Subhash...
ICDT
2009
ACM
248views Database» more  ICDT 2009»
16 years 4 months ago
Automatic verification of data-centric business processes
We formalize and study business process systems that are centered around "business artifacts", or simply "artifacts". This approach focuses on data records, kn...
Alin Deutsch, Richard Hull, Fabio Patrizi, Victor ...
ICASSP
2009
IEEE
15 years 10 months ago
Using complex-valued ICA to efficiently combine radar polarimetric data for target detection
Target detection in sea clutter is a challenging problem in radar detection, specifically, when the Doppler return of the target and clutter are collocated. Polarization diverse ...
Mike Novey, Tülay Adali
ECOOP
2010
Springer
15 years 8 months ago
Capabilities for Uniqueness and Borrowing
Abstract. An important application of unique object references is safe and efficient message passing in concurrent object-oriented programming. However, to prevent the ill effects...
Philipp Haller, Martin Odersky