Sciweavers

55 search results - page 11 / 11
» Whatever Happened to the IT Plan
Sort
View
MICRO
2009
IEEE
315views Hardware» more  MICRO 2009»
13 years 12 months ago
Control flow obfuscation with information flow tracking
Recent micro-architectural research has proposed various schemes to enhance processors with additional tags to track various properties of a program. Such a technique, which is us...
Haibo Chen, Liwei Yuan, Xi Wu, Binyu Zang, Bo Huan...
IJCAI
2003
13 years 6 months ago
Temporal Reasoning with Preferences and Uncertainty
Temporal Constraint Satisfaction Problems allow for reasoning with events happening over time. Their expressiveness has been extended independently in two directions: to account f...
Neil Yorke-Smith, Kristen Brent Venable, Francesca...
MVA
1990
170views Computer Vision» more  MVA 1990»
13 years 6 months ago
Automatic Fire Detection by Changing Region Analysis Based on Geographic Information
This paper proposes a new method for automatic fire detection in cities using image processing techniques. Images are obtained successively at regular intervals from monochrome TV...
Hideo Numagami, Akio Okazaki
BIS
2009
154views Business» more  BIS 2009»
13 years 6 months ago
Using Process Mining to Generate Accurate and Interactive Business Process Maps
Abstract. The quality of today's digital maps is very high. This allows for new functionality as illustrated by modern car navigation systems (e.g., TomTom, Garmin, etc.), Goo...
Wil M. P. van der Aalst
SENSYS
2010
ACM
13 years 3 months ago
Meeting ecologists' requirements with adaptive data acquisition
Ecologists instrument ecosystems to collect time series representing the evolution in time and space of relevant abiotic and biotic factors. Sensor networks promise to improve on ...
Marcus Chang, Philippe Bonnet