Sciweavers

1813 search results - page 316 / 363
» Instance Pruning Techniques
Sort
View
PODS
2009
ACM
119views Database» more  PODS 2009»
15 years 10 months ago
Exceeding expectations and clustering uncertain data
Database technology is playing an increasingly important role in understanding and solving large-scale and complex scientific and societal problems and phenomena, for instance, un...
Sudipto Guha, Kamesh Munagala
71
Voted
SAC
2010
ACM
15 years 4 months ago
TokDoc: a self-healing web application firewall
The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...
PLDI
2009
ACM
15 years 4 months ago
Binary analysis for measurement and attribution of program performance
Modern programs frequently employ sophisticated modular designs. As a result, performance problems cannot be identified from costs attributed to routines in isolation; understand...
Nathan R. Tallent, John M. Mellor-Crummey, Michael...
CADE
2009
Springer
15 years 4 months ago
Interpolant Generation for UTVPI
Abstract. The problem of computing Craig interpolants in SMT has recently received a lot of interest, mainly for its applications in formal verification. Efficient algorithms for ...
Alessandro Cimatti, Alberto Griggio, Roberto Sebas...
53
Voted
ICRA
2009
IEEE
149views Robotics» more  ICRA 2009»
15 years 4 months ago
LSH-RANSAC: An incremental scheme for scalable localization
Abstract— This paper addresses the problem of featurebased robot localization in large-size environments. With recent progress in SLAM techniques, it has become crucial for a rob...
Kenichi Saeki, Kanji Tanaka, Takeshi Ueda