Sciweavers

635 search results - page 99 / 127
» Some Computational Problems Related to Pseudo-intents
Sort
View
ICMI
2007
Springer
183views Biometrics» more  ICMI 2007»
15 years 6 months ago
A survey of affect recognition methods: audio, visual and spontaneous expressions
Automated analysis of human affective behavior has attracted increasing attention from researchers in psychology, computer science, linguistics, neuroscience, and related discipli...
Zhihong Zeng, Maja Pantic, Glenn I. Roisman, Thoma...
KSEM
2007
Springer
15 years 6 months ago
A Merging-Based Approach to Handling Inconsistency in Locally Prioritized Software Requirements
Abstract. It has been widely recognized that the relative priority of requirements can help developers to resolve inconsistencies and make some necessary trade-off decisions. Howe...
Kedian Mu, Weiru Liu, Zhi Jin, Ruqian Lu, Anbu Yue...
VLDB
2007
ACM
115views Database» more  VLDB 2007»
15 years 6 months ago
The Boundary Between Privacy and Utility in Data Publishing
We consider the privacy problem in data publishing: given a database instance containing sensitive information “anonymize” it to obtain a view such that, on one hand attackers...
Vibhor Rastogi, Sungho Hong, Dan Suciu
IJCNN
2006
IEEE
15 years 5 months ago
Particle Swarm Optimization based Defensive Islanding of Large Scale Power System
— Defensive islanding is an efficient way to avoid catastrophic failures and wide area blackouts. Power system splitting especially for large scale power systems is a combinatori...
Wenxin Liu, David A. Cartes, Ganesh K. Venayagamoo...
APLAS
2005
ACM
15 years 5 months ago
Calculating Polynomial Runtime Properties
Affine size-change analysis has been used for termination analysis of eager functional programming languages. The same style of analysis is also capable of compactly recording and ...
Hugh Anderson, Siau-Cheng Khoo, Stefan Andrei, Bea...