Sciweavers

4008 search results - page 710 / 802
» An expressive language of signatures
Sort
View
SP
1997
IEEE
126views Security Privacy» more  SP 1997»
14 years 2 months ago
Filtering Postures: Local Enforcement for Global Policies
When packet filtering is used as a security mechanism, different routers may need to cooperate to enforce the desired security policy. It is difficult to ensure that they will d...
Joshua D. Guttman
ICCAD
1996
IEEE
133views Hardware» more  ICCAD 1996»
14 years 2 months ago
Basic concepts for an HDL reverse engineering tool-set
Designer's productivity has become the key-factor of the development of electronic systems. An increasing application of design data reuse is widely recognized as a promising...
Gunther Lehmann, Bernhard Wunder, Klaus D. Mü...
ISMIS
1997
Springer
14 years 2 months ago
Knowledge-Based Image Retrieval with Spatial and Temporal Constructs
e about image features can be expressed as a hierarchical structure called a Type Abstraction Hierarchy (TAH). TAHs can be generated automatically by clustering algorithms based on...
Wesley W. Chu, Alfonso F. Cardenas, Ricky K. Taira
SIGGRAPH
1996
ACM
14 years 2 months ago
Efficient Generation of Motion Transitions Using Spacetime Constraints
This paper describesthe application of spacetime constraints to creating transitions between segments of human body motion. The motion transition generation uses a combination of ...
Charles Rose, Brian K. Guenter, Bobby Bodenheimer,...
SCIE
1997
Springer
14 years 2 months ago
Semantic Matching: Formal Ontological Distinctions for Information Organization, Extraction, and Integration
Abstract. The task of information extraction can be seen as a problem of semantic matching between a user-defined template and a piece of information written in natural language. T...
Nicola Guarino