Sciweavers

777 search results - page 105 / 156
» presence 2010
Sort
View
PVLDB
2010
99views more  PVLDB 2010»
14 years 11 months ago
Towards Certain Fixes with Editing Rules and Master Data
A variety of integrity constraints have been studied for data cleaning. While these constraints can detect the presence of errors, they fall short of guiding us to correct the err...
Wenfei Fan, Jianzhong Li, Shuai Ma, Nan Tang, Weny...
98
Voted
RAS
2010
108views more  RAS 2010»
14 years 11 months ago
Experimental validation of collective circular motion for nonholonomic multi-vehicle systems
This paper presents the experimental validation of a recently proposed decentralized control law, for the collective circular motion of a team of nonholonomic vehicles about a vir...
Daniele Benedettelli, Nicola Ceccarelli, Andrea Ga...
RV
2010
Springer
172views Hardware» more  RV 2010»
14 years 11 months ago
Recovery Tasks: An Automated Approach to Failure Recovery
Abstract. We present a new approach for developing robust software applications that breaks dependences on the failed parts of an application’s execution to allow the rest of the...
Brian Demsky, Jin Zhou, William Montaz
106
Voted
SADM
2010
123views more  SADM 2010»
14 years 11 months ago
Discriminative frequent subgraph mining with optimality guarantees
The goal of frequent subgraph mining is to detect subgraphs that frequently occur in a dataset of graphs. In classification settings, one is often interested in discovering discr...
Marisa Thoma, Hong Cheng, Arthur Gretton, Jiawei H...
SIAMSC
2010
153views more  SIAMSC 2010»
14 years 11 months ago
Asymptotic Imaging of Perfectly Conducting Cracks
In this paper, we consider cracks with Dirichlet boundary conditions. We first derive an asymptotic expansion of the boundary perturbations that are due to the presence of a smal...
Habib Ammari, Hyeonbae Kang, Hyundae Lee, Won-Kwan...