Sciweavers

1486 search results - page 92 / 298
» Firewall Rules Analysis
Sort
View
JOT
2006
113views more  JOT 2006»
15 years 3 months ago
Constraint Validation in Model Compilers
Model transformation has become one of the most focused research field, motivated by for instance the OMG's Model-Driven Architecture (MDA). Metamodeling is a central techniq...
László Lengyel, Tihamer Levendovszky...
DKE
2002
218views more  DKE 2002»
15 years 3 months ago
Computing iceberg concept lattices with T
We introduce the notion of iceberg concept lattices and show their use in knowledge discovery in databases. Iceberg lattices are a conceptual clustering method, which is well suit...
Gerd Stumme, Rafik Taouil, Yves Bastide, Nicolas P...
CVPR
2003
IEEE
16 years 5 months ago
Perception-based 3D Triangle Mesh Segmentation Using Fast Marching Watersheds
In this paper, we describe an algorithm called Fast Marching Watersheds that segments a triangle mesh into visual parts. This computer vision algorithm leverages a human vision th...
David L. Page, Andreas Koschan, Mongi A. Abidi
94
Voted
ICSOC
2005
Springer
15 years 9 months ago
Towards Dynamic Monitoring of WS-BPEL Processes
The intrinsic flexibility and dynamism of service-centric applications preclude their pre-release validation and demand for suitable probes to monitor their behavior at run-time. ...
Luciano Baresi, Sam Guinea
128
Voted
KDD
1995
ACM
99views Data Mining» more  KDD 1995»
15 years 7 months ago
Knowledge Discovery in a Water Quality Database
Weapply rule induction to mine for knowledgein a database which stores data obtained by monitoring the water quality of the rivers in Slovenia. The database contains measurementda...
Saso Dzeroski