Sciweavers

4856 search results - page 864 / 972
» Concept formation in design
Sort
View
CORR
2010
Springer
157views Education» more  CORR 2010»
13 years 8 months ago
Active Integrity Constraints and Revision Programming
We study active integrity constraints and revision programming, two formalisms designed to describe integrity constraints on databases and to specify policies on preferred ways to...
Luciano Caroprese, Miroslaw Truszczynski
IAJIT
2010
95views more  IAJIT 2010»
13 years 8 months ago
Modelling of Updating Moving Object Database Using Timed Petri Net Model
: Tracking moving objects is one of the most common requirements for many location-based applications. The location of a moving object changes continuously but the database locatio...
Hatem Abdul-Kader, Warda El-Kholy
ICRA
2010
IEEE
165views Robotics» more  ICRA 2010»
13 years 8 months ago
Vector field SLAM
— Designing a localization system for a low-cost robotic consumer product poses a major challenge. In previous work, we introduced Vector Field SLAM [5], a system for simultaneou...
Jens-Steffen Gutmann, Gabriel Brisson, Ethan Eade,...
ICTAC
2010
Springer
13 years 8 months ago
A Modality for Safe Resource Sharing and Code Reentrancy
Abstract. The potential of linear logic in facilitating reasoning on resource usage has long been recognized. However, convincing uses of linear types in practical programming are ...
Rui Shi, Dengping Zhu, Hongwei Xi
IEEESP
2010
126views more  IEEESP 2010»
13 years 8 months ago
Privacy-Preserving Sharing of Sensitive Information
The need for controlled sharing of sensitive information occurs in many realistic everyday scenarios, ranging from critical (e.g., national security) to mundane (e.g., social netw...
Salvatore J. Stolfo, Gene Tsudik