Sciweavers

3220 search results - page 160 / 644
» Constrained Graph Processes
Sort
View
119
Voted
AGTIVE
2003
Springer
15 years 7 months ago
Integrating Graph Rewriting and Standard Software Tools
OptimixJ is a graph rewrite tool that can be embedded easily into the standard software process. Applications and models can be developed in Java or UML and extended by graph rewri...
Uwe Aßmann, Johan Lövdahl
110
Voted
PVLDB
2010
122views more  PVLDB 2010»
15 years 1 months ago
On Graph Query Optimization in Large Networks
The dramatic proliferation of sophisticated networks has resulted in a growing need for supporting effective querying and mining methods over such large-scale graph-structured da...
Peixiang Zhao, Jiawei Han
120
Voted
ICPR
2008
IEEE
16 years 3 months ago
Similarity-based matching for face authentication
We propose in this paper a face authentication method based on a similarity measure. The SIFT descriptor is used to define some interest keypoints characterized by an invariant pa...
Christophe Rosenberger, Luc Brun
103
Voted
APN
1999
Springer
15 years 7 months ago
Detection of Illegal Behaviors Based on Unfoldings
We show how the branching process approach can be used for the detection of illegal behaviors. Our study is based on the specification of properties in terms of testers that cover...
Jean-Michel Couvreur, Denis Poitrenaud
157
Voted
PRDC
2009
IEEE
15 years 9 months ago
Quantifying Criticality of Dependability-Related IT Organization Processes in CobiT
—With ever-growing complexity of computer and communication systems analytical methods do not scale, especially with respect to dependability assessment of information technology...
Tobias Goldschmidt, Andreas Dittrich, Miroslaw Mal...