Sciweavers

1663 search results - page 305 / 333
» Computer Security in the Real World
Sort
View
DSOM
2003
Springer
15 years 7 months ago
Eos: An Approach of Using Behavior Implications for Policy-Based Self-Management
Systems are becoming exceedingly complex to manage. As such, there is an increasing trend towards developing systems that are self-managing. Policy-based infrastructures have been ...
Sandeep Uttamchandani, Carolyn L. Talcott, David P...
ICCSA
2003
Springer
15 years 7 months ago
Information Extraction to Generate Visual Simulations of Car Accidents from Written Descriptions
This paper describes a system to create animated 3D scenes of car accidents from written reports. The text-to-scene conversion process consists of two stages. An information extrac...
Pierre Nugues, Sylvain Dupuy, Arjan Egges
106
Voted
ECCV
2010
Springer
15 years 6 months ago
Handling Urban Location Recognition as a 2D Homothetic Problem
Abstract. We address the problem of large scale place-of-interest recognition in cell phone images of urban scenarios. Here, we go beyond what has been shown in earlier approaches ...
COOPIS
2002
IEEE
15 years 6 months ago
Formal Ontology Engineering in the DOGMA Approach
This paper presents a specifically database-inspired approach (called DOGMA) for engineering formal ontologies, implemented as shared resources used to express agreed formal semant...
Mustafa Jarrar, Robert Meersman
EDOC
2002
IEEE
15 years 6 months ago
Business Modelling for Component Systems with UML
The EC funded COMBINE Project has the objective of dramatically improving software development productivity by providing a holistic approach to component-based development of Ente...
Sandy Tyndale-Biscoe, Oliver Sims, Bryan Wood, Chr...