Sciweavers

34181 search results - page 203 / 6837
» The Computer System GRAPHOGRAPH
Sort
View
JUCS
2002
81views more  JUCS 2002»
14 years 10 months ago
Membrane Computing: The Power of (Rule) Creation
: We consider a uniform way of treating objects and rules in P systems: we start with multisets of rules, which are consumed when they are applied, but the application of a rule ma...
Fernando Arroyo, Angel V. Baranda, Juan Castellano...
KI
2010
Springer
14 years 9 months ago
Towards High-Level Human Activity Recognition through Computer Vision and Temporal Logic
Most approaches to the visual perception of humans do not include high-level activity recognitition. This paper presents a system that fuses and interprets the outputs of several c...
Joris Ijsselmuiden, Rainer Stiefelhagen
ASPDAC
2010
ACM
151views Hardware» more  ASPDAC 2010»
14 years 8 months ago
Source-level timing annotation for fast and accurate TLM computation model generation
This paper proposes a source-level timing annotation method for generation of accurate transaction level models for software computation modules. While Transaction Level Modeling ...
Kai-Li Lin, Chen Kang Lo, Ren-Song Tsay
SIGMOD
2005
ACM
111views Database» more  SIGMOD 2005»
15 years 11 months ago
Efficient Computation of Multiple Group By Queries
Data analysts need to understand the quality of data in the warehouse. This is often done by issuing many Group By queries on the sets of columns of interest. Since the volume of ...
Zhimin Chen, Vivek R. Narasayya
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
15 years 5 months ago
Computational Evaluation of Software Security Attributes
In the current state of practice, security properties of software systems are typically assessed through subjective, labor-intensive human evaluation. Moreover, much of the quanti...
Gwendolyn H. Walton, Thomas A. Longstaff, Richard ...