Sciweavers

1486 search results - page 92 / 298
» Firewall Rules Analysis
Sort
View
JOT
2006
113views more  JOT 2006»
14 years 12 months ago
Constraint Validation in Model Compilers
Model transformation has become one of the most focused research field, motivated by for instance the OMG's Model-Driven Architecture (MDA). Metamodeling is a central techniq...
László Lengyel, Tihamer Levendovszky...
DKE
2002
218views more  DKE 2002»
14 years 11 months ago
Computing iceberg concept lattices with T
We introduce the notion of iceberg concept lattices and show their use in knowledge discovery in databases. Iceberg lattices are a conceptual clustering method, which is well suit...
Gerd Stumme, Rafik Taouil, Yves Bastide, Nicolas P...
CVPR
2003
IEEE
16 years 1 months ago
Perception-based 3D Triangle Mesh Segmentation Using Fast Marching Watersheds
In this paper, we describe an algorithm called Fast Marching Watersheds that segments a triangle mesh into visual parts. This computer vision algorithm leverages a human vision th...
David L. Page, Andreas Koschan, Mongi A. Abidi
ICSOC
2005
Springer
15 years 5 months ago
Towards Dynamic Monitoring of WS-BPEL Processes
The intrinsic flexibility and dynamism of service-centric applications preclude their pre-release validation and demand for suitable probes to monitor their behavior at run-time. ...
Luciano Baresi, Sam Guinea
KDD
1995
ACM
99views Data Mining» more  KDD 1995»
15 years 3 months ago
Knowledge Discovery in a Water Quality Database
Weapply rule induction to mine for knowledgein a database which stores data obtained by monitoring the water quality of the rivers in Slovenia. The database contains measurementda...
Saso Dzeroski