Sciweavers

2834 search results - page 429 / 567
» Representing Trees with Constraints
Sort
View
103
Voted
AAAI
2008
15 years 1 months ago
Reasoning about Large Taxonomies of Actions
We design a representation based on the situation calculus to facilitate development, maintenance and elaboration of very large taxonomies of actions. This representation leads to...
Yilan Gu, Mikhail Soutchanski
DBSEC
2009
122views Database» more  DBSEC 2009»
15 years 1 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
111
Voted
SIGIR
2010
ACM
15 years 29 days ago
Ontology-enriched multi-document summarization in disaster management
In this poster, we propose a novel document summarization approach named Ontology-enriched M ulti-Document Summarization(OMS) for utilizing background knowledge to improve summari...
Lei Li, Dingding Wang, Chao Shen, Tao Li
CG
2008
Springer
15 years 26 days ago
Parallel reflective symmetry transformation for volume data
Many volume data possess symmetric features that can be clearly observed, for example, those existing in diffusion tensor image data sets. The exploitations of symmetries for volu...
Yuan Hong, Han-Wei Shen
CORR
2010
Springer
173views Education» more  CORR 2010»
15 years 26 days ago
CONCISE: Compressed 'n' Composable Integer Set
Bit arrays, or bitmaps, are used to significantly speed up set operations in several areas, such as data warehousing, information retrieval, and data mining, to cite a few. Howeve...
Alessandro Colantonio, Roberto Di Pietro