Sciweavers

3836 search results - page 498 / 768
» Semantics of Database Transformations
Sort
View
135
Voted
EJIS
2007
115views more  EJIS 2007»
15 years 5 months ago
Towards agent-oriented model-driven architecture
Model-Driven Architecture (MDA) supports the transformation from reusable models to executable software. Business representations, however, cannot be fully and explicitly represen...
Liang Xiao 0002, Des Greer
JUCS
2007
91views more  JUCS 2007»
15 years 4 months ago
Generative Instructional Engineering of Competence Development Programmes
: Competence development programmes are collections of units of learning and learning activities used to increase the overall effective performance of a learner within a certain ta...
Juan Manuel Dodero, Salvador Sánchez Alonso...
ICLP
2011
Springer
14 years 8 months ago
Constraints in Non-Boolean Contexts
In high-level constraint modelling languages, constraints can occur in non-Boolean contexts: implicitly, in the form of partial functions, or more explicitly, in the form of const...
Leslie De Koninck, Sebastian Brand, Peter J. Stuck...
CVPR
2008
IEEE
16 years 7 months ago
Discriminative local binary patterns for human detection in personal album
In recent years, local pattern based object detection and recognition have attracted increasing interest in computer vision research community. However, to our best knowledge no p...
Yadong Mu, Shuicheng Yan, Yi Liu, Thomas S. Huang,...
ICDE
2008
IEEE
154views Database» more  ICDE 2008»
16 years 6 months ago
Butterfly: Protecting Output Privacy in Stream Mining
Abstract-- Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The l...
Ting Wang, Ling Liu