Sciweavers

2421 search results - page 227 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
145
Voted
WWW
2008
ACM
16 years 5 months ago
Using subspace analysis for event detection from web click-through data
Although most of existing research usually detects events by analyzing the content or structural information of Web documents, a recent direction is to study the usage data. In th...
Ling Chen 0002, Yiqun Hu, Wolfgang Nejdl
124
Voted
PVLDB
2010
122views more  PVLDB 2010»
15 years 3 months ago
Avalanche-Safe LINQ Compilation
We report on a query compilation technique that enables the construction of alternative efficient query providers for Microsoft’s Language Integrated Query (LINQ) framework. LIN...
Torsten Grust, Jan Rittinger, Tom Schreiber
151
Voted
TCBB
2008
137views more  TCBB 2008»
15 years 4 months ago
Toward Verified Biological Models
The last several decades have witnessed a vast accumulation of biological data and data analysis. Many of these data sets represent only a small fraction of the system's behav...
Avital Sadot, Jasmin Fisher, Dan Barak, Yishai Adm...
EDBT
2006
ACM
121views Database» more  EDBT 2006»
16 years 4 months ago
A Decomposition-Based Probabilistic Framework for Estimating the Selectivity of XML Twig Queries
In this paper we present a novel approach for estimating the selectivity of XML twig queries. Such a technique is useful for approximate query answering as well as for determining...
Chao Wang, Srinivasan Parthasarathy, Ruoming Jin
ICIP
2006
IEEE
16 years 6 months ago
Ghost Removal in High Dynamic Range Images
High dynamic range images may be created by capturing multiple images of a scene with varying exposures. Images created in this manner are prone to ghosting artifacts, which appea...
Ahmet Oguz Akyüz, Erik Reinhard, Erum Arif Kh...