Sciweavers

1431 search results - page 236 / 287
» Solving Constraints in Model Transformations
Sort
View
TPHOL
2007
IEEE
15 years 6 months ago
HOL2P - A System of Classical Higher Order Logic with Second Order Polymorphism
Abstract. This paper introduces the logical system HOL2P that extends classical higher order logic (HOL) with type operator variables and universal types. HOL2P has explicit term o...
Norbert Völker
92
Voted
ACCV
2007
Springer
15 years 6 months ago
Mirror Localization for Catadioptric Imaging System by Observing Parallel Light Pairs
This paper describes a method of mirror localization to calibrate a catadioptric imaging system. While the calibration of a catadioptric system includes the estimation of various p...
Ryusuke Sagawa, Nobuya Aoki, Yasushi Yagi
109
Voted
ICAC
2006
IEEE
15 years 6 months ago
Utility-aware Resource Allocation in an Event Processing System
— Event processing systems link event producers and consumers in a flexible manner, by supporting multiple communication patterns and powerful message transformations. Such syst...
Sumeer Bhola, Mark Astley, Robert Saccone, Michael...
121
Voted
COOPIS
2003
IEEE
15 years 5 months ago
Ontology Based Query Processing in Database Management Systems
The use of semantic knowledge in its various forms has become an important aspect in managing data in database and information systems. In the form of integrity constraints, it ha...
Chokri Ben Necib, Johann Christoph Freytag
119
Voted
CCS
2003
ACM
15 years 5 months ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu