Sciweavers

1355 search results - page 261 / 271
» Techniques for Formal Verification of Digital Systems: A Sys...
Sort
View
MTA
2008
134views more  MTA 2008»
13 years 9 months ago
A survey of content based 3D shape retrieval methods
Recent developments in techniques for modeling, digitizing and visualizing 3D shapes has led to an explosion in the number of available 3D models on the Internet and in domain-spe...
Johan W. H. Tangelder, Remco C. Veltkamp
SIGMOD
2012
ACM
230views Database» more  SIGMOD 2012»
11 years 11 months ago
Pay-as-you-go data integration for linked data: opportunities, challenges and architectures
Linked Data (LD) provides principles for publishing data that underpin the development of an emerging web of data. LD follows the web in providing low barriers to entry: publisher...
Norman W. Paton, Klitos Christodoulou, Alvaro A. A...
SIGMOD
2010
ACM
145views Database» more  SIGMOD 2010»
13 years 7 months ago
How to ConQueR why-not questions
One useful feature that is missing from today’s database systems is an explain capability that enables users to seek clarifications on unexpected query results. There are two t...
Quoc Trung Tran, Chee-Yong Chan
WWW
2005
ACM
14 years 9 months ago
A service creation environment based on end to end composition of Web services
The demand for quickly delivering new applications is increasingly becoming a business imperative today. Application development is often done in an ad hoc manner, without standar...
Vikas Agarwal, Koustuv Dasgupta, Neeran M. Karnik,...
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
14 years 26 days ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...