Sciweavers

1486 search results - page 130 / 298
» Firewall Rules Analysis
Sort
View
141
Voted
AAI
2010
108views more  AAI 2010»
15 years 4 months ago
Augmenting Subsumption Propagation in Distributed Description Logics
Distributed Description Logics (DDL) enable reasoning with multiple ontologies interconnected by directional semantic mapping, called bridge rules. Bridge rules map concepts of a s...
Martin Homola, Luciano Serafini
BIOSYSTEMS
2008
129views more  BIOSYSTEMS 2008»
15 years 4 months ago
Reconstruction of DNA sequences using genetic algorithms and cellular automata: Towards mutation prediction?
Change of DNA sequence that fuels evolution is, to a certain extent, a deterministic process because mutagenesis does not occur in an absolutely random manner. So far, it has not ...
Ch. Mizas, Georgios Ch. Sirakoulis, Vasilios A. Ma...
ICIP
2003
IEEE
16 years 5 months ago
Adaptive rule-based recognition of events in video sequences
Knowledge-based fuzzy inference and neural learning are used in this paper in order to model the event recognition task in semantic video analysis. The advantage of their use is t...
Vassilis Tzouvaras, Gabriel Tsechpenakis, Giorgos ...
ICPR
2010
IEEE
15 years 11 months ago
Statistical Shape Modeling using Morphological Representations
The aim of this paper is to propose tools for statistical analysis of shape families using morphological operators. Given a series of shape families (or shape categories), the appr...
S. Velasco-Forero and J. Angulo
ICDAR
2009
IEEE
15 years 11 months ago
Threshold Correction of Document Image Binarization for Ruled-line Extraction
In this paper, a new threshold correction method for document image binarization that is forcused on ruled-line extraction is presented. This method enhances the binary image of a...
Hiroshi Tanaka