Sciweavers

2176 search results - page 236 / 436
» Refactoring Methods for Knowledge Bases
Sort
View
136
Voted
ICML
2009
IEEE
16 years 4 months ago
Structure learning of Bayesian networks using constraints
This paper addresses exact learning of Bayesian network structure from data and expert's knowledge based on score functions that are decomposable. First, it describes useful ...
Cassio Polpo de Campos, Zhi Zeng, Qiang Ji
137
Voted
ESORICS
2002
Springer
16 years 3 months ago
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation
Abstract. An important goal of security in information systems is confidentiality. A confidentiality policy specifies which users should be forbidden to acquire what kind of inform...
Joachim Biskup, Piero A. Bonatti
WISE
2009
Springer
16 years 1 months ago
Seeing Past Rivals: Visualizing Evolution of Coordinate Terms over Time
In this paper, we describe an approach for detection and visualization of coordinate term relationships over time and their evolution using temporal data available on the Web. Coor...
Hiroaki Ohshima, Adam Jatowt, Satoshi Oyama, Katsu...
ICPR
2010
IEEE
15 years 10 months ago
Co-recognition of Actions in Video Pairs
In this paper, we present a method that recognizes single or multiple common actions between a pair of video sequences. We establish an energy function that evaluates geometric and...
Young Min Shin (Seoul National University), Minsu ...
102
Voted
ACCV
2009
Springer
15 years 10 months ago
Globally Optimal Spatio-temporal Reconstruction from Cluttered Videos
We propose a method for multi-view reconstruction from videos adapted to dynamic cluttered scenes under uncontrolled imaging conditions. Taking visibility into account and being ba...
Ehsan Aganj, Jean-Philippe Pons, Renaud Keriven