Sciweavers

571 search results - page 89 / 115
» Matching Algorithms within a Duplicate Detection System
Sort
View
AISC
1994
Springer
15 years 6 months ago
Using Commutativity Properties for Controlling Coercions
This paper investigates some soundness conditions which have to be fulfilled in systems with coercions and generic operators. A result of Reynolds on unrestricted generic operators...
Stephan A. Missura, Andreas Weber
133
Voted
BPM
2006
Springer
153views Business» more  BPM 2006»
15 years 6 months ago
Decision Mining in ProM
Process-aware Information Systems typically log events (e.g., in transaction logs or audit trails) related to the actual business process executions. Proper analysis of these execu...
Anne Rozinat, Wil M. P. van der Aalst
SP
2002
IEEE
103views Security Privacy» more  SP 2002»
15 years 2 months ago
Methods and Limitations of Security Policy Reconciliation
A security policy specifies session participant requirements. However, existing frameworks provide limited facilities for the automated reconciliation of participant policies. Thi...
Patrick Drew McDaniel, Atul Prakash
CVPR
2007
IEEE
16 years 4 months ago
Flexible Object Models for Category-Level 3D Object Recognition
Today's category-level object recognition systems largely focus on fronto-parallel views of objects with characteristic texture patterns. To overcome these limitations, we pr...
Akash Kushal, Cordelia Schmid, Jean Ponce
135
Voted
PERCOM
2003
ACM
16 years 2 months ago
Energy-Aware Target Localization in Wireless Sensor Networks
Wireless distributed sensor networks (DSNs) are important for a number of strategic applications such as coordinated target detection, surveillance, and localization. Energy is a ...
Yi Zou, Krishnendu Chakrabarty