Sciweavers

10792 search results - page 1925 / 2159
» An Evaluation of Non-Equijoin Algorithms
Sort
View
ENTCS
2006
104views more  ENTCS 2006»
14 years 11 months ago
Using Bytecode Instruction Counting as Portable CPU Consumption Metric
Accounting for the CPU consumption of applications is crucial for software development to detect and remove performance bottlenecks (profiling) and to evaluate the performance of ...
Walter Binder, Jarle Hulaas
IJCV
2008
147views more  IJCV 2008»
14 years 11 months ago
Shape-Based Mutual Segmentation
We present a novel variational approach for simultaneous segmentation of two images of the same object taken from different viewpoints. Due to noise, clutter and occlusions, neith...
Tammy Riklin-Raviv, Nir A. Sochen, Nahum Kiryati
ESWA
2006
243views more  ESWA 2006»
14 years 11 months ago
Knowledge based crime scenario modelling
A crucial concern in the evaluation of evidence related to a major crime is the formulation of sufficient alternative plausible scenarios that can explain the available evidence. ...
Jeroen Keppens, Burkhard Schafer
ESWA
2006
149views more  ESWA 2006»
14 years 11 months ago
An effective refinement strategy for KNN text classifier
Due to the exponential growth of documents on the Internet and the emergent need to organize them, the automated categorization of documents into predefined labels has received an...
Songbo Tan
CAD
2007
Springer
14 years 11 months ago
Boundary of the volume swept by a free-form solid in screw motion
The swept volume of a moving solid is a powerful computational and visualization concept. It provides an excellent aid for path and accessibility planning in robotics and for simu...
Jarek Rossignac, J. J. Kim, S. C. Song, K. C. Suh,...
« Prev « First page 1925 / 2159 Last » Next »