Sciweavers

3597 search results - page 632 / 720
» Flexible Database Generators
Sort
View
LREC
2010
112views Education» more  LREC 2010»
15 years 6 months ago
Principled Construction of Elicited Imitation Tests
In this paper we discuss the methodology behind the construction of elicited imitation (EI) test items. First we examine varying uses for EI tests in research and in testing overa...
Carl Christensen, Ross Hendrickson, Deryle Lonsdal...
IADIS
2008
15 years 6 months ago
Dagma: Mining Directed Acyclic Graphs
We present how to efficiently mine a set of directed acyclic graphs (DAGs) for unconnected, both multi- or single-rooted, and induced fragments. With a new canonical form that is ...
T. Werth, A. Dreweke, Marc Wörlein, Ingrid Fi...
123
Voted
IQ
2007
15 years 6 months ago
Data Quality Aspects Of Revenue Assurance
: Revenue Assurance describes a methodology to increase a company’s income by determining where revenue gets lost, and to maximize their profits by eliminating revenue leakage an...
Katharina Baamann
MVA
2007
137views Computer Vision» more  MVA 2007»
15 years 6 months ago
Fingerprint Core and Delta Detection by Candidate Analysis
This paper presents a new reliable detection of core and delta in fingerprints by candidate analysis. The line search based method, which is one of the reliable approaches to dete...
Tomohiko Ohtsuka, Daisuke Watanabe, Hiroyuki Aoki
SEBD
2007
148views Database» more  SEBD 2007»
15 years 6 months ago
Containment of Conjunctive Object Meta-Queries
We consider the problem of query containment over an object data model derived from F-logic. F-logic has generated considerable interest commercially, in the academia, and within ...
Andrea Calì, Michael Kifer