Sciweavers

TKDE
2012
253views Formal Methods» more  TKDE 2012»
12 years 1 months ago
Adding Temporal Constraints to XML Schema
—If past versions of XML documents are retained, what of the various integrity constraints defined in XML Schema on those documents? This paper describes how to interpret such c...
Faiz Currim, Sabah Currim, Curtis E. Dyreson, Rich...
INFOCOM
2012
IEEE
12 years 1 months ago
Towards temporal access control in cloud computing
—Access control is one of the most important security mechanisms in cloud computing. Attribute-based access control provides a flexible approach that allows data owners to integ...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang,...
CLIMA
2011
12 years 11 months ago
Justice Delayed Is Justice Denied: Logics for a Temporal Account of Reparations and Legal Compliance
In this paper we extend the logic of violation proposed by [14] with time, more precisely, we temporalise that logic. The resulting system allows us to capture many subtleties of t...
Guido Governatori, Antonino Rotolo
ICCV
2011
IEEE
12 years 11 months ago
3D Reconstruction of a Smooth Articulated Trajectory from a Monocular Image Sequence
An articulated trajectory is defined as a trajectory that remains at a fixed distance with respect to a parent trajectory. In this paper, we present a method to reconstruct an a...
Hyun Soo Park, Yaser Sheikh
ISCAS
2011
IEEE
205views Hardware» more  ISCAS 2011»
13 years 3 months ago
A new Temporal-Constraint-Based algorithm by handling temporal qualities for video enhancement
—Video enhancement has played very important roles in many applications. However, most existing enhancement methods only focus on the spatial quality within a frame while the tem...
Jun Xie, Weiyao Lin, Hongxiang Li, Ning Xu, Hongyu...
GIS
2010
ACM
13 years 8 months ago
Time geography inverted: recognizing intentions in space and time
Mobile intention recognition is the problem of inferring a mobile user's intentions from her behavior in geographic space. Such behavior is constrained in space and time. Cur...
Peter Kiefer, Martin Raubal, Christoph Schlieder
CONSTRAINTS
1998
127views more  CONSTRAINTS 1998»
13 years 11 months ago
Experimental Analysis of Numeric and Symbolic Constraint Satisfaction Techniques for Temporal Reasoning
Many temporal applications like planning and scheduling can be viewed as special cases of the numeric and symbolic temporal constraint satisfaction problem. Thus we have developed ...
Malek Mouhoub, François Charpillet, Jean Pa...
JSS
2000
123views more  JSS 2000»
13 years 11 months ago
Approaches for broadcasting temporal data in mobile computing systems
Rapid advances in mobile communication technology have spawned many new mobile applications. A key element in many of these systems is the need to distribute real-time information...
Kam-yiu Lam, Edward Chan, Joe Chun-Hung Yuen
TCS
2008
13 years 11 months ago
New constructions for provably-secure time-bound hierarchical key assignment schemes
A time-bound hierarchical key assignment scheme is a method to assign time-dependent encryption keys to a set of classes in a partially ordered hierarchy, in such a way that each ...
Alfredo De Santis, Anna Lisa Ferrara, Barbara Masu...
SP
2008
IEEE
159views Security Privacy» more  SP 2008»
13 years 11 months ago
Inferring neuronal network connectivity from spike data: A temporal data mining approach
Abstract. Understanding the functioning of a neural system in terms of its underlying circuitry is an important problem in neuroscience. Recent developments in electrophysiology an...
Debprakash Patnaik, P. S. Sastry, K. P. Unnikrishn...