Sciweavers

1737 search results - page 306 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
SIGMOD
2004
ACM
262views Database» more  SIGMOD 2004»
14 years 10 months ago
The Next Database Revolution
Database system architectures are undergoing revolutionary changes. Most importantly, algorithms and data are being unified by integrating programming languages with the database ...
Jim Gray
ICRA
2007
IEEE
175views Robotics» more  ICRA 2007»
14 years 4 months ago
Visual Servoing in Non-Rigid Environments: A Space-Time Approach
— Most robotic vision algorithms are proposed by envisaging robots operating in structured environments where the world is assumed to be rigid. These algorithms fail to provide o...
D. Santosh, C. V. Jawahar
LREC
2010
201views Education» more  LREC 2010»
13 years 11 months ago
Cultural Heritage: Knowledge Extraction from Web Documents
This article presents the use of NLP techniques (text mining, text analysis) to develop specific tools that allow to create linguistic resources related to the cultural heritage d...
Eva Sassolini, Alessandra Cinini
IJCAI
2003
13 years 11 months ago
Statistics Gathering for Learning from Distributed, Heterogeneous and Autonomous Data Sources
With the growing use of distributed information networks, there is an increasing need for algorithmic and system solutions for data-driven knowledge acquisition using distributed,...
Doina Caragea, Jaime Reinoso, Adrian Silvescu, Vas...
SIROCCO
2000
13 years 11 months ago
Cooperative computing with fragmentable and mergeable groups
ABSTRACT: This work considers the problem of performing a set of N tasks on a set of P cooperating message-passing processors (P N). The processors use a group communication servi...
Chryssis Georgiou, Alexander A. Shvartsman