Sciweavers

2067 search results - page 320 / 414
» Modeling and exploiting query interactions in database syste...
Sort
View
TACAS
2010
Springer
212views Algorithms» more  TACAS 2010»
15 years 2 months ago
Assume-Guarantee Verification for Probabilistic Systems
Abstract. We present a compositional verification technique for systems that exhibit both probabilistic and nondeterministic behaviour. We adopt an assume-guarantee approach to ver...
Marta Z. Kwiatkowska, Gethin Norman, David Parker,...
CVPR
2007
IEEE
16 years 6 months ago
A Unified Probabilistic Framework for Facial Activity Modeling and Understanding
Facial activities are the most natural and powerful means of human communication. Spontaneous facial activity is characterized by rigid head movements, non-rigid facial muscular m...
Yan Tong, Wenhui Liao, Zheng Xue, Qiang Ji
BTW
2007
Springer
236views Database» more  BTW 2007»
15 years 8 months ago
A Classification of Schema Mappings and Analysis of Mapping Tools
: Schema mapping techniques for data exchange have become popular and useful tools both in research and industry. A schema mapping relates a source schema with a target schema via ...
Frank Legler, Felix Naumann
ICC
2009
IEEE
125views Communications» more  ICC 2009»
15 years 2 months ago
HMM-Web: A Framework for the Detection of Attacks Against Web Applications
Nowadays, the web-based architecture is the most frequently used for a wide range of internet services, as it allows to easily access and manage information and software on remote ...
Igino Corona, Davide Ariu, Giorgio Giacinto
AAAI
2010
15 years 5 months ago
Modeling Dynamic Multi-Topic Discussions in Online Forums
In the form of topic discussions, users interact with each other to share knowledge and exchange information in online forums. Modeling the evolution of topic discussion reveals h...
Hao Wu, Jiajun Bu, Chun Chen, Can Wang, Guang Qiu,...