Sciweavers

4498 search results - page 646 / 900
» How to Invent Functions
Sort
View
DESRIST
2009
Springer
137views Education» more  DESRIST 2009»
15 years 9 months ago
Coordination analysis: a method for deriving use cases from process dependencies
Despite the widespread recognition that information technology (IT) and business process are tightly connected, existing system design methods provide limited guidance on how to t...
Xiang Michelle Liu, George M. Wyner
EDBT
2009
ACM
108views Database» more  EDBT 2009»
15 years 9 months ago
Reverse k-nearest neighbor search in dynamic and general metric databases
In this paper, we propose an original solution for the general reverse k-nearest neighbor (RkNN) search problem. Compared to the limitations of existing methods for the RkNN searc...
Elke Achtert, Hans-Peter Kriegel, Peer Kröger...
ICLP
2009
Springer
15 years 9 months ago
Integration of Abductive Reasoning and Constraint Optimization in SCIFF
Abstract. Abductive Logic Programming (ALP) and Constraint Logic Programming (CLP) share the feature to constrain the set of possible solutions to a program via integrity or CLP co...
Marco Gavanelli, Marco Alberti, Evelina Lamma
CCS
2001
ACM
15 years 9 months ago
The faithfulness of abstract protocol analysis: message authentication
hfulness of Abstract Protocol Analysis: Message Authentication∗ Joshua D. Guttman F. Javier Thayer Lenore D. Zuck December 18, 2002 Dolev and Yao initiated an approach to studyi...
Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuc...
DAGM
2001
Springer
15 years 9 months ago
A New Contour-Based Approach to Object Recognition for Assembly Line Robots
A complete processing chain for visual object recognition is described in this paper. The system automatically detects individual objects on an assembly line, identifies their typ...
Markus Suing, Lothar Hermes, Joachim M. Buhmann