Sciweavers

1778 search results - page 208 / 356
» Building a Knowledge Base: An Example
Sort
View
102
Voted
TVCG
2010
153views more  TVCG 2010»
14 years 11 months ago
Hierarchical Aggregation for Information Visualization: Overview, Techniques, and Design Guidelines
—We present a model for building, visualizing, and interacting with multiscale representations of information visualization techniques using hierarchical aggregation. The motivat...
Niklas Elmqvist, Jean-Daniel Fekete
100
Voted
ICPR
2006
IEEE
16 years 1 months ago
Learning Wormholes for Sparsely Labelled Clustering
Distance functions are an important component in many learning applications. However, the correct function is context dependent, therefore it is advantageous to learn a distance f...
Eng-Jon Ong, Richard Bowden
120
Voted
TPHOL
2009
IEEE
15 years 7 months ago
A Formalisation of Smallfoot in HOL
In this paper a general framework for separation logic inside the HOL theorem prover is presented. This framework is based on Abeparation Logic. It contains a model of an abstract,...
Thomas Tuerk
91
Voted
WCRE
1999
IEEE
15 years 5 months ago
Reusing Domains for the Construction of Reverse Engineering Tools
One of the challenges of reverse engineering is the extraction of a specification from source code. Our work proposes a singular approach to the construction of reverse engineerin...
Felipe Gouveia de Freitas, Julio Cesar Sampaio do ...
81
Voted
WWW
2010
ACM
15 years 7 months ago
Fine-grained privilege separation for web applications
We present a programming model for building web applications with security properties that can be confidently verified during a security review. In our model, applications are d...
Akshay Krishnamurthy, Adrian Mettler, David Wagner