Sciweavers

1513 search results - page 280 / 303
» Semantic Business Process Analysis
Sort
View
ACSC
2009
IEEE
15 years 10 months ago
Privacy-aware Access Control with Generalization Boundaries
Privacy is today an important concern for both data providers and data users. Data generalization can provide significant protection of an individual’s privacy, which means the...
Min Li, Hua Wang, Ashley W. Plank
ICRA
2009
IEEE
248views Robotics» more  ICRA 2009»
15 years 10 months ago
Comparison of surface normal estimation methods for range sensing applications
— As mobile robotics is gradually moving towards a level of semantic environment understanding, robust 3D object recognition plays an increasingly important role. One of the most...
Klaas Klasing, Daniel Althoff, Dirk Wollherr, Mart...
151
Voted
FM
2009
Springer
190views Formal Methods» more  FM 2009»
15 years 10 months ago
Dynamic Classes: Modular Asynchronous Evolution of Distributed Concurrent Objects
Abstract. Many long-lived and distributed systems must remain available yet evolve over time, due to, e.g., bugfixes, feature extensions, or changing user requirements. To facilit...
Einar Broch Johnsen, Marcel Kyas, Ingrid Chieh Yu
ENC
2008
IEEE
15 years 10 months ago
Context-Aware Generation of User Interface Containers for Mobile Devices
—The world of the mobile devices involves restrictive features. Multiple efforts have been done to define the User Interface. Here, it is combined a neutral description of the UI...
Francisco J. Martínez-Ruiz, Jean Vanderdonc...
ICDE
2007
IEEE
106views Database» more  ICDE 2007»
15 years 10 months ago
Mining Trajectory Databases via a Suite of Distance Operators
With the rapid progress of mobile devices and positioning technologies, Trajectory Databases (TD) have been in the core of database research during the last decade. Analysis and k...
Nikos Pelekis, Ioannis Kopanakis, Irene Ntoutsi, G...