Sciweavers

4004 search results - page 632 / 801
» Selecting an Approach to Designing Group Support Systems
Sort
View

Publication
1763views
16 years 29 days ago
Reranking with Contextual dissimilarity measures from representational Bregman k-means
We present a novel reranking framework for Content Based Image Retrieval (CBIR) systems based on con-textual dissimilarity measures. Our work revisit and extend the method of Perro...
Olivier Schwander, Frank Nielsen
131
Voted
IDEAS
2002
IEEE
111views Database» more  IDEAS 2002»
15 years 9 months ago
Distributing CORBA views from an OODBMS
The need to distribute objects on the Internet and to offer views from databases has found a solution with the advent of CORBA. Most database management systems now offer CORBA in...
Eric Viara, Guy Vaysseix, Emmanuel Barillot
134
Voted
CCS
2007
ACM
15 years 10 months ago
Specifying and analyzing security automata using CSP-OZ
Security automata are a variant of B¨uchi automata used to specify security policies that can be enforced by monitoring system execution. In this paper, we propose using CSP-OZ, ...
David A. Basin, Ernst-Rüdiger Olderog, Paul E...
140
Voted
WADT
1998
Springer
15 years 8 months ago
An Algebra of Graph Derivations Using Finite (co-) Limit Double Theories
Graph transformation systems have been introduced for the formal specification of software systems. States are thereby modeled as graphs, and computations as graph derivations acco...
Andrea Corradini, Martin Große-Rhode, Reiko ...
CSREAPSC
2006
15 years 6 months ago
Ubiquitous Security: Privacy versus Protection
- In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling perva...
Timothy Buennemeyer, Randolph Marchany, Joseph G. ...