Sciweavers

5164 search results - page 284 / 1033
» Consistency of the EKF-SLAM Algorithm
Sort
View
PVLDB
2010
151views more  PVLDB 2010»
15 years 3 months ago
Scalable Discovery of Best Clusters on Large Graphs
The identification of clusters, well-connected components in a graph, is useful in many applications from biological function prediction to social community detection. However, ...
Kathy Macropol, Ambuj K. Singh
143
Voted
PVLDB
2010
120views more  PVLDB 2010»
15 years 3 months ago
Sampling the Repairs of Functional Dependency Violations under Hard Constraints
Violations of functional dependencies (FDs) are common in practice, often arising in the context of data integration or Web data extraction. Resolving these violations is known to...
George Beskales, Ihab F. Ilyas, Lukasz Golab
SSS
2010
Springer
118views Control Systems» more  SSS 2010»
15 years 3 months ago
Modeling and Analyzing Periodic Distributed Computations
The earlier work on predicate detection has assumed that the given computation is finite. Detecting violation of a liveness predicate requires that the predicate be evaluated on a...
Anurag Agarwal, Vijay K. Garg, Vinit A. Ogale
VL
2010
IEEE
195views Visual Languages» more  VL 2010»
15 years 3 months ago
Causal Reasoning with Neuron Diagrams
The principle of causation is fundamental to science and society and has remained an active topic of discourse in philosophy for over two millennia. Modern philosophers often rely...
Martin Erwig, Eric Walkingshaw
WDAG
2010
Springer
204views Algorithms» more  WDAG 2010»
15 years 3 months ago
The Cost of Privatization
Software transactional memory (STM) guarantees that a transaction, consisting of a sequence of operations on the memory, appears to be executed atomically. In practice, it is impor...
Hagit Attiya, Eshcar Hillel