Sciweavers

1528 search results - page 277 / 306
» Semantic Compliance Management in Business Process Managemen...
Sort
View
MM
2005
ACM
146views Multimedia» more  MM 2005»
14 years 4 months ago
Unsupervised content discovery in composite audio
Automatically extracting semantic content from audio streams can be helpful in many multimedia applications. Motivated by the known limitations of traditional supervised approache...
Rui Cai, Lie Lu, Alan Hanjalic
ADBIS
2004
Springer
224views Database» more  ADBIS 2004»
14 years 4 months ago
Using Ontologies for Database Query Reformulation
Abstract. Query reformulation techniques based on semantic knowledge have been used in two ways in database management systems, namely for query optimization and for data integrati...
Chokri Ben Necib, Johann Christoph Freytag
ISM
2008
IEEE
101views Multimedia» more  ISM 2008»
14 years 5 months ago
Photo Context as a Bag of Words
In the recent years, photo context metadata (e.g., date, GPS coordinates) have been proved to be useful in the management of personal photos. However, these metadata are still poo...
Windson Viana, Samira Hammiche, Marlène Vil...
CONCUR
2003
Springer
14 years 3 months ago
Abstract Patterns of Compositional Reasoning
Patterns of Compositional Reasoning Nina Amla1 , E. Allen Emerson2 , Kedar Namjoshi3 , and Richard Trefler4 1 Cadence Design Systems 2 Univ. of Texas at Austin 3 Bell Labs, Lucent...
Nina Amla, E. Allen Emerson, Kedar S. Namjoshi, Ri...
IDTRUST
2010
ACM
14 years 5 months ago
Computational techniques for increasing PKI policy comprehension by human analysts
Natural-language policies found in X.509 PKI describe an organization’s stated policy as a set of requirements for trust. The widespread use of X.509 underscores the importance ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith