Sciweavers

2477 search results - page 127 / 496
» Object list controlled process data system
Sort
View
ICASSP
2011
IEEE
14 years 6 months ago
Online anomaly detection with expert system feedback in social networks
In this paper, we propose examining the participants in various meetings or communications within a social network, and using sequential inference based on these participant lists...
Corinne Horn, Rebecca Willett
CCS
2007
ACM
15 years 9 months ago
Incremental adaptation of XPath access control views
Materialized XPath access-control views are commonly used for enforcing access control. When access control rules defining a materialized XML access-control view change, the view...
Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee,...
SIGGRAPH
1989
ACM
15 years 7 months ago
Hypertexture
This paper will examine hypertexture rendering techniques and will demonstrate how volume data sets may be adapted in order for hypertexture to be applied. Details are given of a c...
Ken Perlin, Eric M. Hoffert
CDC
2008
IEEE
142views Control Systems» more  CDC 2008»
15 years 9 months ago
Asynchronous distributed optimization with minimal communication
— We consider problems where multiple agents must cooperate to control their individual state so as to optimize a common objective while communicating with each other to exchange...
Minyi Zhong, Christos G. Cassandras
CSMR
2000
IEEE
15 years 7 months ago
Architectural Design Recovery using Data Mining Techniques
This paper presents a technique for recovering the high level design of legacy software systems according to user defined architectural plans. Architectural plans are represented...
Kamran Sartipi, Kostas Kontogiannis, Farhad Mavadd...