Sciweavers

3318 search results - page 113 / 664
» The Weak Instance Model
Sort
View
BIS
2009
168views Business» more  BIS 2009»
13 years 9 months ago
Defining Adaptation Constraints for Business Process Variants
Abstract. In current dynamic business environment, it has been argued that certain characteristics of ad-hocism in business processes are desirable. Such business processes typical...
Ruopeng Lu, Shazia Wasim Sadiq, Guido Governatori,...
ECCV
2006
Springer
14 years 10 months ago
Uncalibrated Factorization Using a Variable Symmetric Affine Camera
Abstract. In order to reconstruct 3-D Euclidean shape by the TomasiKanade factorization, one needs to specify an affine camera model such as orthographic, weak perspective, and par...
Ken-ichi Kanatani, Yasuyuki Sugaya, Hanno Ackerman...
INAP
2001
Springer
14 years 15 days ago
Content-based Management of Document Access Control
Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strengt...
Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwa...
ECCV
2008
Springer
14 years 10 months ago
Robust Multiple Structures Estimation with J-Linkage
This paper tackles the problem of fitting multiple instances of a model to data corrupted by noise and outliers. The proposed solution is based on random sampling and conceptual da...
Roberto Toldo, Andrea Fusiello
GECCO
2007
Springer
132views Optimization» more  GECCO 2007»
14 years 2 months ago
Empirical analysis of ideal recombination on random decomposable problems
This paper analyzes the behavior of a selectorecombinative genetic algorithm (GA) with an ideal crossover on a class of random additively decomposable problems (rADPs). Specifical...
Kumara Sastry, Martin Pelikan, David E. Goldberg