Sciweavers

1486 search results - page 206 / 298
» Firewall Rules Analysis
Sort
View
JSS
2010
89views more  JSS 2010»
14 years 10 months ago
Verification and validation of declarative model-to-model transformations through invariants
In this paper we propose a method to derive OCL invariants from declarative model-to-model transformations in order to enable their verification and analysis. For this purpose we ...
Jordi Cabot, Robert Clarisó, Esther Guerra,...
TMM
2010
141views Management» more  TMM 2010»
14 years 10 months ago
A Robust Block-Based Image/Video Registration Approach for Mobile Imaging Devices
Digital video stabilization enables to acquire video sequences without disturbing jerkiness by compensating unwanted camera movements. In this paper we propose a novel fast image r...
Sebastiano Battiato, Arcangelo Bruna, Giovanni Pug...
ICASSP
2011
IEEE
14 years 7 months ago
Weighted compressed sensing and rank minimization
—We present an alternative analysis of weighted 1 minimization for sparse signals with a nonuniform sparsity model, and extend our results to nuclear norm minimization for matric...
Samet Oymak, M. Amin Khajehnejad, Babak Hassibi
SIGMOD
2011
ACM
198views Database» more  SIGMOD 2011»
14 years 6 months ago
U-MAP: a system for usage-based schema matching and mapping
This demo shows how usage information buried in query logs can play a central role in data integration and data exchange. More specifically, our system U-Map uses query logs to g...
Hazem Elmeleegy, Jaewoo Lee, El Kindi Rezig, Moura...
INFOCOM
2012
IEEE
13 years 6 months ago
Delay and rate-optimal control in a multi-class priority queue with adjustable service rates
—We study two convex optimization problems in a multi-class M/G/1 queue with adjustable service rates: minimizing convex functions of the average delay vector, and minimizing ave...
Chih-Ping Li, Michael J. Neely