Sciweavers

2088 search results - page 308 / 418
» The Probabilistic Method
Sort
View
PODS
1998
ACM
152views Database» more  PODS 1998»
15 years 5 months ago
A Cost Model for Similarity Queries in Metric Spaces
We consider the problem of estimating CPU (distance computations) and I/O costs for processing range and k-nearest neighbors queries over metric spaces. Unlike the specific case ...
Paolo Ciaccia, Marco Patella, Pavel Zezula
90
Voted
CP
1998
Springer
15 years 5 months ago
Constraints for Object Recognition in Aerial Images - Handling of Unobserved Features
In this paper we will show how constraint solving methods can be applied for the recognition of buildings in aerial images. Object models are transformed to constraint representati...
Thomas H. Kolbe
75
Voted
DAC
1996
ACM
15 years 5 months ago
A Probability-Based Approach to VLSI Circuit Partitioning
Iterative-improvement 2-way min-cut partitioning is an important phase in most circuit partitioning tools. Most iterative improvement techniques for circuit netlists like the Fidd...
Shantanu Dutt, Wenyong Deng
113
Voted
3DPVT
2004
IEEE
153views Visualization» more  3DPVT 2004»
15 years 4 months ago
Surface Reconstruction from the Projection of Points, Curves and Contours
In this paper the problem of building and reconstructing geometrical surface models from multiple calibrated images is considered. We build an appropriate statistical 3D model fro...
Jan Erik Solem, Fredrik Kahl
102
Voted
RAID
2000
Springer
15 years 4 months ago
Adaptive, Model-Based Monitoring for Cyber Attack Detection
Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack...
Alfonso Valdes, Keith Skinner