Sciweavers

2230 search results - page 222 / 446
» Reformulating Constraint Models Using Input Data
Sort
View
ICIP
2003
IEEE
16 years 4 months ago
Road network extraction in remote sensing by a Markov object process
In this paper, we rely on the theory of marked point processes to perform an unsupervised road network extraction from optical and radar images. A road network is modeled by a Mar...
Caroline Lacoste, Xavier Descombes, Josiane Zerubi...
UIST
2006
ACM
15 years 9 months ago
A direct texture placement and editing interface
The creation of most models used in computer animation and computer games requires the assignment of texture coordinates, texture painting, and texture editing. We present a novel...
Yotam I. Gingold, Philip L. Davidson, Jefferson Y....
ICDE
2007
IEEE
193views Database» more  ICDE 2007»
16 years 4 months ago
Categorization and Optimization of Synchronization Dependencies in Business Processes
requirement. Furthermore, programming using sequence constructs normally produce nested structures and The current approachfor modeling synchronization in scattered code, especiall...
Qinyi Wu, Calton Pu, Akhil Sahai, Roger S. Barga
ICML
2008
IEEE
16 years 3 months ago
Fast solvers and efficient implementations for distance metric learning
In this paper we study how to improve nearest neighbor classification by learning a Mahalanobis distance metric. We build on a recently proposed framework for distance metric lear...
Kilian Q. Weinberger, Lawrence K. Saul
ICDE
2008
IEEE
178views Database» more  ICDE 2008»
16 years 4 months ago
On the Optimal Selection of k in the k-Anonymity Problem
When disseminating data involving human subjects, researchers have to weigh in the requirements of privacy of the individuals involved in the data. A model widely used for enhancin...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...