Sciweavers

2338 search results - page 366 / 468
» Using UML to model relational database operations
Sort
View
GIS
2008
ACM
14 years 10 months ago
Mining user similarity based on location history
The pervasiveness of location-acquisition technologies (GPS, GSM networks, etc.) enable people to conveniently log the location histories they visited with spatio-temporal data. T...
Quannan Li, Yu Zheng, Xing Xie, Yukun Chen, Wenyu ...
ISWC
1997
IEEE
14 years 1 months ago
Stochasticks: Augmenting the Billiards Experience with Probabilistic Vision and Wearable Computers
We propose a practical application of wearable computing and augmented reality which enhances the game of billiards. A vision algorithm is implemented which operates in interactiv...
Tony Jebara, Cyrus Eyster, Joshua Weaver, Thad Sta...
RSKT
2010
Springer
13 years 7 months ago
Ordered Weighted Average Based Fuzzy Rough Sets
Traditionally, membership to the fuzzy-rough lower, resp. upper approximation is determined by looking only at the worst, resp. best performing object. Consequently, when applied t...
Chris Cornelis, Nele Verbiest, Richard Jensen
CBSE
2005
Springer
14 years 2 months ago
Exogenous Connectors for Software Components
In existing component models, control originates in components, and connectors are channels for passing on the control to other components. This provides a mechanism for message pa...
Kung-Kiu Lau, Perla Velasco Elizondo, Zheng Wang
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 9 months ago
Real-Time Alert Correlation with Type Graphs
The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in ...
Gianni Tedesco, Uwe Aickelin