Sciweavers

59 search results - page 9 / 12
» Complexity of determining nonemptiness of the core
Sort
View
EDBT
2000
ACM
13 years 10 months ago
Performance and Availability Assessment for the Configuration of Distributed Workflow Management Systems
Workflow management systems (WFMSs) that are geared for the orchestration of enterprise-wide or even "virtual-enterprise"-style business processes across multiple organi...
Michael Gillmann, Jeanine Weißenfels, Gerhar...
AAAI
2006
13 years 8 months ago
Planning with First-Order Temporally Extended Goals using Heuristic Search
Temporally extended goals (TEGs) refer to properties that must hold over intermediate and/or final states of a plan. The problem of planning with TEGs is of renewed interest becau...
Jorge A. Baier, Sheila A. McIlraith
IM
2003
13 years 8 months ago
Firewall Policy Advisor for Anomaly Discovery and Rule Editing
Abstract: Firewalls are core elements in network security. However, managing firewall rules, especially for enterprize networks, has become complex and error-prone. Firewall filt...
Ehab S. Al-Shaer, Hazem H. Hamed
CCR
2008
77views more  CCR 2008»
13 years 7 months ago
What would Darwin think about clean-slate architectures?
As significant resources are directed towards clean-slate networking research, it is imperative to understand how cleanslate architectural research compares to the diametrically o...
Constantine Dovrolis
PR
2006
114views more  PR 2006»
13 years 7 months ago
Orientation feature for fingerprint matching
This paper describes a fingerprint verification algorithm based on the orientation field. The orientation field of a fingerprint image has also been used for image alignment. Area...
Jayant V. Kulkarni, Bhushan D. Patil, Raghunath S....