Sciweavers

759 search results - page 82 / 152
» Verification of a Microprocessor Using Real World Applicatio...
Sort
View
VLDB
2007
ACM
128views Database» more  VLDB 2007»
15 years 10 months ago
Automating the Detection of Snapshot Isolation Anomalies
Snapshot isolation (SI) provides significantly improved concurrency over 2PL, allowing reads to be non-blocking. Unfortunately, it can also lead to non-serializable executions in ...
Sudhir Jorwekar, Alan Fekete, Krithi Ramamritham, ...
DASFAA
2005
IEEE
137views Database» more  DASFAA 2005»
15 years 3 months ago
A General Approach to Mining Quality Pattern-Based Clusters from Microarray Data
Abstract. Pattern-based clustering has broad applications in microarray data analysis, customer segmentation, e-business data analysis, etc. However, pattern-based clustering often...
Daxin Jiang, Jian Pei, Aidong Zhang
IVA
2010
Springer
14 years 8 months ago
High Score! - Motivation Strategies for User Participation in Virtual Human Development
Conversational modeling requires an extended time commitment, and the difficulty associated with capturing the wide range of conversational stimuli necessitates extended user parti...
Shivashankar Halan, Brent Rossen, Juan Cendan, Ben...
ICIP
2004
IEEE
15 years 11 months ago
Water video analysis
Many image processing and computer vision applications have difficulty dealing with a nonstatic background such as water waves, but this particular dynamic scene actually contains...
Lisa Spencer, Mubarak Shah
CRV
2008
IEEE
118views Robotics» more  CRV 2008»
15 years 4 months ago
Generating Semantic Information from 3D Scans of Crime Scenes
Recent advancements in laser and visible light sensor technology allows for the collection of photorealistic 3D scans of large scale spaces. This enables the technology to be used...
Anna Topol, Michael Jenkin, Jarek Gryz, Stephanie ...