Sciweavers

1433 search results - page 196 / 287
» An approach to detecting failures automatically
Sort
View
AVSS
2009
IEEE
15 years 5 months ago
Compact Signatures for 3D Face Recognition under Varying Expressions
We present a novel approach to 3D face recognition using compact face signatures based on automatically detected 3D landmarks. We represent the face geometry with inter-landmark d...
Fahad Daniyal, Prathap Nair, Andrea Cavallaro
MMB
1997
Springer
126views Communications» more  MMB 1997»
15 years 4 months ago
Goal-oriented Performance Control for Transaction Processing
The performance of current transaction processing systems largely depends on human experts for administration and tuning. These experts have to specify a multitude of internal con...
Erhard Rahm
CIKM
2009
Springer
15 years 6 months ago
Reducing the risk of query expansion via robust constrained optimization
We introduce a new theoretical derivation, evaluation methods, and extensive empirical analysis for an automatic query expansion framework in which model estimation is cast as a r...
Kevyn Collins-Thompson
VLDB
2004
ACM
144views Database» more  VLDB 2004»
16 years 3 days ago
Preserving mapping consistency under schema changes
Abstract. In dynamic environments like the Web, data sources may change not only their data but also their schemas, their semantics, and their query capabilities.When a mapping is ...
Yannis Velegrakis, Renée J. Miller, Lucian Popa
SYNASC
2005
IEEE
98views Algorithms» more  SYNASC 2005»
15 years 5 months ago
Archeology of Code Duplication: Recovering Duplication Chains from Small Duplication Fragments
Code duplication is a common problem, and a wellknown sign of bad design. As a result of that, in the last decade, the issue of detecting code duplication led to various solutions...
Richard Wettel, Radu Marinescu