Sciweavers

1421 search results - page 104 / 285
» Satisfying KBO Constraints
Sort
View
HICSS
2009
IEEE
97views Biometrics» more  HICSS 2009»
14 years 3 months ago
Selecting Web Services and Participants for Enforcing Workflow Access Control
Web services have emerged as a de facto standard for encapsulating services within or across organization boundaries. Various proposals have been made to compose Web services into...
San-Yih Hwang, Chuan Yin, Chien-Hsiang Lee
ICALT
2008
IEEE
14 years 2 months ago
A Framework for Semantic Group Formation
Collaboration has long been considered an effective approach to learning. However, forming optimal groups can be a time consuming and complex task. Different approaches have been ...
Asma Ounnas, Hugh C. Davis, David E. Millard
ACCV
2007
Springer
14 years 2 months ago
Identifying Foreground from Multiple Images
In this paper, we present a novel foreground extraction method that automatically identifies image regions corresponding to a common space region seen from multiple cameras. We as...
Wonwoo Lee, Woontack Woo, Edmond Boyer
REFSQ
2007
Springer
14 years 2 months ago
Integrated Requirement Selection and Scheduling for the Release Planning of a Software Product
This paper investigates two integer linear programming models that integrate requirement scheduling into software release planning. The first model can schedule the development of ...
C. Li, J. M. van den Akker, Sjaak Brinkkemper, Gui...
DEXAW
2005
IEEE
156views Database» more  DEXAW 2005»
14 years 1 months ago
Fixing Inconsistent Databases by Updating Numerical Attributes
For several reasons a database may not satisfy certain integrity constraints (ICs). However, most likely most of the information in it is still consistent with the ICs; and could ...
Leopoldo E. Bertossi, Loreto Bravo, Enrico Francon...