Sciweavers

10988 search results - page 2142 / 2198
» Algorithmic Folding Complexity
Sort
View
124
Voted
ATAL
2006
Springer
15 years 6 months ago
Robust recognition of physical team behaviors using spatio-temporal models
This paper presents a framework for robustly recognizing physical team behaviors by exploiting spatio-temporal patterns. Agent team behaviors in athletic and military domains typi...
Gita Sukthankar, Katia P. Sycara
120
Voted
CSFW
2004
IEEE
15 years 6 months ago
Cassandra: Flexible Trust Management, Applied to Electronic Health Records
We study the specification of access control policy in large-scale distributed systems. We present Cassandra, a language and system for expressing policy, and the results of a sub...
Moritz Y. Becker, Peter Sewell
150
Voted
BPM
2006
Springer
166views Business» more  BPM 2006»
15 years 6 months ago
Process Mining by Measuring Process Block Similarity
Mining, discovering, and integrating process-oriented services has attracted growing attention in the recent year. Workflow precedence graph and workflow block structures are two i...
Joonsoo Bae, James Caverlee, Ling Liu, Hua Yan
DATE
2004
IEEE
119views Hardware» more  DATE 2004»
15 years 6 months ago
MINCE: Matching INstructions Using Combinational Equivalence for Extensible Processor
Designing custom-extensible instructions for Extensible Processors1 is a computationally complex task because of the large design space. The task of automatically matching candida...
Newton Cheung, Sri Parameswaran, Jörg Henkel,...
DSN
2004
IEEE
15 years 6 months ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
« Prev « First page 2142 / 2198 Last » Next »