Sciweavers

4166 search results - page 711 / 834
» Automating the constraining process
Sort
View
POLICY
2001
Springer
15 years 8 months ago
IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution
IPSec (Internet Security Protocol Suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inef...
Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fen...
SEMWEB
2001
Springer
15 years 8 months ago
ITTALKS: A Case Study in the Semantic Web and DAML
Effective use of the vast quantity of information now available on the web will require the use of “Semantic Web” markup languages such as the DARPA Agent Markup Language (DAML...
R. Scott Cost, Timothy W. Finin, Anupam Joshi, Yun...
VLDB
2001
ACM
86views Database» more  VLDB 2001»
15 years 8 months ago
Intelligent Rollups in Multidimensional OLAP Data
In this paper we propose a new operator for advanced exploration of large multidimensional databases. The proposed operator can automatically generalize from a specific problem c...
Gayatri Sathe, Sunita Sarawagi
ICEIS
2000
IEEE
15 years 7 months ago
Syntax-Directed Translation Schemes for Multi-Agent Systems Conversation Modelling
: In modern organisations the monolithic information systems of the past are being gradually replaced by networked systems, enabling distributed computing often based on multi-agen...
Ana L. N. Fred, Joaquim Filipe
ICPR
2000
IEEE
15 years 7 months ago
Thyroid Cancer Cells Boundary Location by a Fuzzy Edge Detection Method
2. Obtain the gray-levelgradient magnitude. 3. Derive the threshold surface by deforming the original image gray-level surface. 4. The thresholdsurface interpolation. 5. Segmentati...
C. C. Leung, Francis H. Y. Chan, Paul C. K. Kwok, ...