Sciweavers

3077 search results - page 537 / 616
» Research issues
Sort
View
106
Voted
CGF
1998
118views more  CGF 1998»
15 years 11 days ago
An Exhaustive Error-Bounding Algorithm for Hierarchical Radiosity
This paper presents a complete algorithm for the evaluation and control of error in radiosity calculations. Providing such control is both extremely important for industrial appli...
Nicolas Holzschuch, François X. Sillion
91
Voted
CIKM
2010
Springer
14 years 11 months ago
Mapping web pages to database records via link paths
In this paper we propose a new knowledge management task which aims to map Web pages to their corresponding records in a structured database. For example, the DBLP database contai...
Tim Weninger, Fabio Fumarola, Jiawei Han, Donato M...
ISI
2008
Springer
15 years 19 days ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
116
Voted
ICSE
2008
IEEE-ACM
16 years 1 months ago
Data flow testing of service-oriented workflow applications
WS-BPEL applications are a kind of service-oriented application. They use XPath extensively to integrate loosely-coupled workflow steps. However, XPath may extract wrong data from...
Lijun Mei, W. K. Chan, T. H. Tse
ALPIT
2007
IEEE
15 years 7 months ago
Toward DB-IR Integration: Per-Document Basis Transactional Index Maintenance
While information retrieval (IR) and databases (DB) have been developed independently, there have been emerging requirements that both data management and efficient text retrieva...
Jinsuk Kim, Du-Seok Jin, Yunsoo Choi, Chang-Hoo Je...