Sciweavers

191 search results - page 28 / 39
» Service Description and Analysis From a Type Theoretic Appro...
Sort
View
ADC
2009
Springer
122views Database» more  ADC 2009»
14 years 2 months ago
What is Required in Business Collaboration?
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...
ICDAR
2005
IEEE
14 years 1 months ago
The Recognition Strategy Language
The table recognition literature contains many strategies specified informally as a sequence of operations, obscuring both models of table structure and the effects of individual...
Richard Zanibbi, Dorothea Blostein, James R. Cordy
DM
2007
125views more  DM 2007»
13 years 7 months ago
Generalized switch-setting problems
Switch-setting games like Lights Out are typically modelled as a graph, where the vertices represent switches and lamps, and the edges capture the switching rules. We generalize t...
Torsten Muetze
DIS
2007
Springer
14 years 1 months ago
A Hilbert Space Embedding for Distributions
We describe a technique for comparing distributions without the need for density estimation as an intermediate step. Our approach relies on mapping the distributions into a reprodu...
Alexander J. Smola, Arthur Gretton, Le Song, Bernh...
ECAI
2010
Springer
13 years 8 months ago
A Fault-model-based Debugging Aid for Data Warehouse Applications
The paper describes a model-based approach to developing a general tool for localizing faults in applications of data warehouse technology. A model of the application is configured...
Peter Struss, Vikas Shivashankar, Mohamed Zahoor