Sciweavers

3638 search results - page 46 / 728
» Distribution chain security
Sort
View
EDOC
2005
IEEE
14 years 2 months ago
Bridging the Gap between Data Warehouses and Business Processes: A Business Intelligence Perspective for Event-Driven Process Ch
Data Warehouse (DWH) information is accessed by business processes, and sometimes may also initiate changes of the control flow of business process instances. Today, there are no ...
Veronika Stefanov, Beate List
SODA
1997
ACM
76views Algorithms» more  SODA 1997»
13 years 10 months ago
Markov Chains for Linear Extensions, the Two-Dimensional Case
We study the generation of uniformly distributed linear extensions using Markov chains. In particular we show that monotone coupling from the past can be applied in the case of lin...
Stefan Felsner, Lorenz Wernisch
CORR
2008
Springer
121views Education» more  CORR 2008»
13 years 9 months ago
Rate-Distortion via Markov Chain Monte Carlo
We propose an approach to lossy source coding, utilizing ideas from Gibbs sampling, simulated annealing, and Markov Chain Monte Carlo (MCMC). The idea is to sample a reconstructio...
Shirin Jalali, Tsachy Weissman
ECCV
2008
Springer
14 years 11 months ago
Statistical Analysis of Global Motion Chains
Abstract. Multiple elements such as lighting, colors, dialogue, and camera motion contribute to the style of a movie. Among them, camera motion is commonly overlooked yet a crucial...
Jenny Yuen, Yasuyuki Matsushita
IEEEARES
2007
IEEE
14 years 3 months ago
Secure Distributed Dossier Management in the Legal Domain
The use of digital dossiers in Courts of Law, although currently in the phase of study, will be common practice in the future. This paper introduces the notion of distributed digi...
Martijn Warnier, Frances M. T. Brazier, Martin Api...