Sciweavers

565 search results - page 67 / 113
» Evaluating computer-supported cooperative work: models and f...
Sort
View
VLDB
2005
ACM
165views Database» more  VLDB 2005»
15 years 3 months ago
Semantic Adaptation of Schema Mappings when Schemas Evolve
Schemas evolve over time to accommodate the changes in the information they represent. Such evolution causes invalidation of various artifacts depending on the schemas, such as sc...
Cong Yu, Lucian Popa
CDC
2009
IEEE
133views Control Systems» more  CDC 2009»
15 years 2 months ago
On the security of linear consensus networks
Abstract—This work considers the problem of reaching consensus in an unreliable linear consensus network. A solution to this problem is relevant for several tasks in multi-agent ...
Fabio Pasqualetti, Antonio Bicchi, Francesco Bullo
ICDCS
2010
IEEE
15 years 1 months ago
Analyzing Self-Defense Investments in Internet Security under Cyber-Insurance Coverage
—Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an ...
Ranjan Pal, Leana Golubchik
WFLP
2009
Springer
277views Algorithms» more  WFLP 2009»
15 years 4 months ago
Termination of Context-Sensitive Rewriting with Built-In Numbers and Collection Data Structures
Context-sensitive rewriting is a restriction of rewriting that can be used to elegantly model declarative specification and programming languages such as Maude. Furthermore, it ca...
Stephan Falke, Deepak Kapur
CVPR
2011
IEEE
14 years 1 months ago
How does Person Identity Recognition Help Multi-Person Tracking?
We address the problem of multi-person tracking in a complex scene from a single camera. Although trackletassociation methods have shown impressive results in several challenging ...
Cheng-Hao Kuo, Ram Nevatia