Sciweavers

1086 search results - page 176 / 218
» Jug measuring: Algorithms and complexity
Sort
View
SIGMOD
2005
ACM
119views Database» more  SIGMOD 2005»
16 years 1 months ago
DogmatiX Tracks down Duplicates in XML
Duplicate detection is the problem of detecting different entries in a data source representing the same real-world entity. While research abounds in the realm of duplicate detect...
Melanie Weis, Felix Naumann
ISSTA
2009
ACM
15 years 7 months ago
Memory slicing
Traditional dynamic program slicing techniques are code-centric, meaning dependences are introduced between executed statement instances, which gives rise to various problems such...
Bin Xin, Xiangyu Zhang
JCDL
2009
ACM
115views Education» more  JCDL 2009»
15 years 7 months ago
Using timed-release cryptography to mitigate the preservation risk of embargo periods
Due to temporary access restrictions, embargoed data cannot be refreshed to unlimited parties during the embargo time interval. A solution to mitigate the risk of data loss has be...
Rabia Haq, Michael L. Nelson
MM
2009
ACM
196views Multimedia» more  MM 2009»
15 years 7 months ago
Mirror world navigation for mobile users based on augmented reality
Finding a destination in unfamiliar environments of complex office building or shopping mall has been always bothering us in daily life. Fine-scale directional guidance, a combina...
Patricia P. Wang, Tao Wang, Dayong Ding, Yimin Zha...
ICPR
2008
IEEE
15 years 7 months ago
Layered shape matching and registration: Stochastic sampling with hierarchical graph representation
To automatically register foreground target in cluttered images, we present a novel hierarchical graph representation and a stochastic computing strategy in Bayesian framework. Th...
Xiaobai Liu, Liang Lin, Hongwei Li, Hai Jin, Wenbi...