Sciweavers

1486 search results - page 206 / 298
» Firewall Rules Analysis
Sort
View
JSS
2010
89views more  JSS 2010»
14 years 6 months ago
Verification and validation of declarative model-to-model transformations through invariants
In this paper we propose a method to derive OCL invariants from declarative model-to-model transformations in order to enable their verification and analysis. For this purpose we ...
Jordi Cabot, Robert Clarisó, Esther Guerra,...
TMM
2010
141views Management» more  TMM 2010»
14 years 6 months ago
A Robust Block-Based Image/Video Registration Approach for Mobile Imaging Devices
Digital video stabilization enables to acquire video sequences without disturbing jerkiness by compensating unwanted camera movements. In this paper we propose a novel fast image r...
Sebastiano Battiato, Arcangelo Bruna, Giovanni Pug...
ICASSP
2011
IEEE
14 years 3 months ago
Weighted compressed sensing and rank minimization
—We present an alternative analysis of weighted 1 minimization for sparse signals with a nonuniform sparsity model, and extend our results to nuclear norm minimization for matric...
Samet Oymak, M. Amin Khajehnejad, Babak Hassibi
SIGMOD
2011
ACM
198views Database» more  SIGMOD 2011»
14 years 2 months ago
U-MAP: a system for usage-based schema matching and mapping
This demo shows how usage information buried in query logs can play a central role in data integration and data exchange. More specifically, our system U-Map uses query logs to g...
Hazem Elmeleegy, Jaewoo Lee, El Kindi Rezig, Moura...
INFOCOM
2012
IEEE
13 years 2 months ago
Delay and rate-optimal control in a multi-class priority queue with adjustable service rates
—We study two convex optimization problems in a multi-class M/G/1 queue with adjustable service rates: minimizing convex functions of the average delay vector, and minimizing ave...
Chih-Ping Li, Michael J. Neely