Sciweavers

1678 search results - page 311 / 336
» An Information Model of Virtual Collaboration
Sort
View
PST
2008
15 years 3 months ago
The Uncertainty of the Truth
Can we trust without any reliable truth information? Most trust architectures work in a similar way: a trustor makes some observations, rates the trustee, and makes recommendations...
Michel Deriaz
DIWEB
2001
15 years 3 months ago
Converting XML Data To UML Diagrams For Conceptual Data Integration
The demand for data integration is rapidly becoming larger as more and more information sources appear in modern enterprises. In many situations a logical (rather than physical) i...
Mikael R. Jensen, Thomas H. Møller, Torben ...
WORM
2003
15 years 3 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
DKE
2010
167views more  DKE 2010»
15 years 2 months ago
The consistency extractor system: Answer set programs for consistent query answering in databases
We describe the Consistency Extractor System (ConsEx) that computes consistent answers to Datalog queries with negation posed to relational databases that may be inconsistent with...
Mónica Caniupán Marileo, Leopoldo E....
RAS
2006
169views more  RAS 2006»
15 years 1 months ago
Projecting registration error for accurate registration of overlapping range images
In this paper, we propose a novel algorithm for the automatic registration of two overlapping range images. Since it is relatively difficult to compare the registration errors of ...
Yonghuai Liu, Baogang Wei, Longzhuang Li, Hong Zho...