Sciweavers

571 search results - page 89 / 115
» Matching Algorithms within a Duplicate Detection System
Sort
View
AISC
1994
Springer
14 years 17 days ago
Using Commutativity Properties for Controlling Coercions
This paper investigates some soundness conditions which have to be fulfilled in systems with coercions and generic operators. A result of Reynolds on unrestricted generic operators...
Stephan A. Missura, Andreas Weber
BPM
2006
Springer
153views Business» more  BPM 2006»
14 years 5 days ago
Decision Mining in ProM
Process-aware Information Systems typically log events (e.g., in transaction logs or audit trails) related to the actual business process executions. Proper analysis of these execu...
Anne Rozinat, Wil M. P. van der Aalst
SP
2002
IEEE
103views Security Privacy» more  SP 2002»
13 years 8 months ago
Methods and Limitations of Security Policy Reconciliation
A security policy specifies session participant requirements. However, existing frameworks provide limited facilities for the automated reconciliation of participant policies. Thi...
Patrick Drew McDaniel, Atul Prakash
CVPR
2007
IEEE
14 years 10 months ago
Flexible Object Models for Category-Level 3D Object Recognition
Today's category-level object recognition systems largely focus on fronto-parallel views of objects with characteristic texture patterns. To overcome these limitations, we pr...
Akash Kushal, Cordelia Schmid, Jean Ponce
PERCOM
2003
ACM
14 years 8 months ago
Energy-Aware Target Localization in Wireless Sensor Networks
Wireless distributed sensor networks (DSNs) are important for a number of strategic applications such as coordinated target detection, surveillance, and localization. Energy is a ...
Yi Zou, Krishnendu Chakrabarty