Sciweavers

607 search results - page 104 / 122
» Managing Constraint Violations in Administrative Information...
Sort
View
DISCEX
2003
IEEE
15 years 5 months ago
The STRONGMAN Architecture
The design principle of restricting local autonomy only where necessary for global robustness has led to a scalable Internet. Unfortunately, this scalability and capacity for dist...
Angelos D. Keromytis, Sotiris Ioannidis, Michael B...
CIKM
2006
Springer
15 years 3 months ago
Constrained subspace skyline computation
In this paper we introduce the problem of Constrained Subspace Skyline Queries. This class of queries can be thought of as a generalization of subspace skyline queries using range...
Evangelos Dellis, Akrivi Vlachou, Ilya Vladimirski...
FGR
1996
IEEE
159views Biometrics» more  FGR 1996»
15 years 3 months ago
Visual Interaction With Lifelike Characters
This paper explores the use of fast, simple computer vision techniques to add compelling visual capabilities to social user interfaces. Social interfaces involve the user in natur...
Matthew Turk
EDBTW
2006
Springer
15 years 3 months ago
Semantically Correct Query Answers in the Presence of Null Values
For several reasons a database may not satisfy a given set of integrity constraints (ICs), but most likely most of the information in it is still consistent with those ICs; and cou...
Loreto Bravo, Leopoldo E. Bertossi
VLC
2008
156views more  VLC 2008»
14 years 11 months ago
An agent-based framework for sketched symbol interpretation
Recognizing hand-sketched symbols is a definitely complex problem. The input drawings are often intrinsically ambiguous, and require context to be interpreted in a correct way. Ma...
Giovanni Casella, Vincenzo Deufemia, Viviana Masca...