Sciweavers

889 search results - page 115 / 178
» Problems in Rewriting III
Sort
View
HICSS
2011
IEEE
247views Biometrics» more  HICSS 2011»
13 years 1 months ago
Model-Driven Development Meets Security: An Evaluation of Current Approaches
Although our society is critically dependent on software systems, these systems are mainly secured by protection mechanisms during operation instead of considering security issues...
Kresimir Kasal, Johannes Heurix, Thomas Neubauer
HICSS
2011
IEEE
279views Biometrics» more  HICSS 2011»
13 years 1 months ago
Analysis of IT/Business Alignment Situations as a Precondition for the Design and Engineering of Situated IT/Business Alignment
IT/business alignment has constantly been among the top priorities for IT executives. From a prescriptive, design research perspective, our analysis of related work shows that nei...
Jan Saat, Robert Winter, Ulrik Franke, Robert Lage...
AAAI
2011
12 years 10 months ago
Sparse Matrix-Variate t Process Blockmodels
We consider the problem of modeling network interactions and identifying latent groups of network nodes. This problem is challenging due to the facts i) that the network nodes are...
Zenglin Xu, Feng Yan, Yuan Qi
CP
2011
Springer
12 years 9 months ago
Pseudo-Tree-Based Incomplete Algorithm for Distributed Constraint Optimization with Quality Bounds
A Distributed Constraint Optimization Problem (DCOP) is a fundamental problem that can formalize various applications related to multi-agent cooperation. Since it is NP-hard, consi...
Tenda Okimoto, Yongjoon Joe, Atsushi Iwasaki, Mako...
ECCV
2010
Springer
12 years 4 months ago
Voting by Grouping Dependent Parts
Hough voting methods efficiently handle the high complexity of multiscale, category-level object detection in cluttered scenes. The primary weakness of this approach is however t...
Pradeep Yarlagadda, Antonio Monroy and Bjorn Ommer