Sciweavers

1968 search results - page 289 / 394
» The Complexity of Valued Constraint Models
Sort
View
AMFG
2003
IEEE
126views Biometrics» more  AMFG 2003»
15 years 3 months ago
Rank Constrained Recognition under Unknown Illuminations
Recognition under illumination variations is a challenging problem. The key is to successfully separate the illumination source from the observed appearance. Once separated, what ...
Shaohua Kevin Zhou, Rama Chellappa
DATE
2010
IEEE
153views Hardware» more  DATE 2010»
15 years 3 months ago
Taming the component timing: A CBD methodology for real-time embedded systems
—The growing trend towards using component based design approach in embedded system development requires addressing newer system engineering challenges. These systems are usually...
Manoj G. Dixit, Pallab Dasgupta, S. Ramesh
EDBT
2009
ACM
85views Database» more  EDBT 2009»
15 years 2 months ago
Expressive, yet tractable XML keys
Constraints are important for a variety of XML recommendations and applications. Consequently, there are numerous opportunities for advancing the treatment of XML semantics. In pa...
Sven Hartmann, Sebastian Link
LSO
2001
Springer
15 years 2 months ago
Knowledge Elicitation through Web-Based Data Mining Services
Knowledge is a vital component for organisational growth and data mining provides the technological basis for automated knowledge elicitation from data sources. The emergence of Ap...
Shonali Krishnaswamy, Seng Wai Loke, Arkady B. Zas...
IPPS
2000
IEEE
15 years 2 months ago
Replicating the Contents of a WWW Multimedia Repository to Minimize Download Time
Dynamic replication algorithms aim at allocating, migrating and deleting copies of an object over various Internet hosts, according to the access patterns exhibited online, so as ...
Thanasis Loukopoulos, Ishfaq Ahmad