Now showing items 733-752 of 1009

  • Rails Girls 54: Making Rails Girls Even More Fun 

    Abrahamsson P; Helmer S; Stan A (University of Lübeck, 2016)
    Rails Girls, which originated in Finland, is a workshop for young women and girls to learn web application development from scratch using Ruby on Rails, i.e., no prior knowledge in programming is required. Here, we want ...
  • Ranking of evolving stories through meta-aggregation 

    Gordevicius, J; Estrada, F; Lee, HC; Andritsos, P; Gamper, J (ACM, 2010)
    In this paper we focus on the problem of ranking news stories within their historical context by exploiting their content similarity. We observe that news stories evolve and thus have to be ranked in a time and query ...
  • Rate of convergence for a Galerkin scheme approximating a two-scale reaction-diffusion system with nonlinear transmission condition 

    Muntean A; Lakkis O (RIMS, 2010)
    We study a two-scale reaction-diffusion system with nonlinear reaction terms and a nonlinear transmission condition (remotely ressembling Henry's law) posed at air-liquid interfaces. We prove the rate of convergence of the ...
  • Rating Elicitation Strategies for Collaborative Filtering 

    Elahi M; Repsys V; Ricci F (Springer, 2011)
    The accuracy of collaborative filtering recommender systems largely depends on two factors: the quality of the recommendation algorithm and the nature of the available item ratings. In general, the more ratings are elicited ...
  • Real-time forward error correction for video transmission 

    Xiao J; Tillo T; Lin C; Zhao Y (IEEE, 2011)
    When the video streams are transmitted over the unreliable networks, forward error correction (FEC) codes are usually used to protect them. Reed-Solomon codes are block-based FEC codes. On one hand, enlarging the block ...
  • Real-time macroblock level bits allocation for depth maps in 3-D video coding 

    Xiao J; Tillo T; Yuan H (Springer, 2012)
    In the texture-plus-depth 3-D video format, the texture videos and depth maps will affect the quality of the synthesized views, this makes bits allocation for the depth maps indispensable. The existing bits allocation ...
  • Real-time video streaming exploiting the late-arrival packets 

    Xiao J; Tillo T; Lin C; Zhao Y (IEEE, 2012)
    For real-time video applications, such as video telephony service, the allowed maximum end-to-end transmission delay is usually fixed. The packets arriving at the destination out of the maximum end-to-end delay are treated ...
  • Reasoning about Relation Based Access Control 

    Artale, A; Crispo, B; Giunchiglia, F; Turkmen, F; Zhang, R (IEEE Computer Society, 2010)
    Relation Based Access Control (RelBAC) is an access control model that places permissions as first class concepts. Under this model, we discuss in this paper how to formalize typical access control policies with Description ...
  • Reasoning in Expressive Description Logics under Infinitely Valued Gödel Semantics 

    Borgwardt, S; Penaloza, R (Springer, 2015)
    Fuzzy Description Logics (FDLs) combine classical Description Logics with the semantics of Fuzzy Logics in order to represent and reason with vague knowledge. Most FDLs using truth values from the interval [0,1] have been ...
  • Reasoning in Expressive Gödel Description Logics 

    Borgwardt S; Peñaloza R (CEUR, 2016)
    Fuzzy description logics (FDLs) are knowledge representation formalisms capable of dealing with imprecise knowledge by allowing intermediate membership degrees in the interpretation of concepts and roles. One option for ...
  • Reasoning in the Description Logic BEL using Bayesian Networks 

    Ceylan II; Peñaloza R (AAAI Press, 2014)
    We study the problem of reasoning in the probabilistic Description Logic ℬℲ. Using a novel structure, we show that probabilistic reasoning in this logic can be reduced in polynomial time to standard inferences over a ...
  • Reasoning on Incomplete Execution Traces Using Action Languages - A First Report 

    Francescomarino, CD; Ghidini, C; Tessaris, S; Sandoval, IV (Springer, 2015)
    In this paper we tackle the problem of reconstructing information about incomplete business process execution traces proposing an approach based on action languages.
  • Reasoning on LTL on Finite Traces: Insensitivity to Infiniteness 

    De Giacomo G; De Masellis R; Montali M (AAAI Press, 2014)
    In this paper we study when an LTL formula on finite traces (LTL/ formula) is insensitive to infiniteness, that is, it can be correctly handled as a formula on infinite traces under the assumption that at a certain point ...
  • Reasoning over Evolving Graph-structured Data Under Constraints 

    Calvanese D (CEUR Electronic Workshop Proceedings, 2016)
    Graph-structured data are receiving increased attention in the database community. We argue that Description Logics (DLs), which are studied extensively in Knowledge Representation, are tightly connected to graph-structured ...
  • Reasoning over Extended ER Models 

    Artale, A; Calvanese, D; Kontchakov, R; Ryzhikov, V; Zakharyaschev, M (Springer, 2007)
    We investigate the computational complexity of reasoning over various fragments of the Extended Entity-Relationship (EER) language, which includes a number of constructs: isa between entities and relationships, disjointness ...
  • Reasoning With Weighted Ontologies 

    Peñaloza R (CEUR, 2009)
    We study the problem of reasoning over weighted ontologies. We assume that every axiom is labeled with an element of a distributive lattice (called its weight) and try to compute its so-called boundary, with respect to a ...
  • Reasoning-based Curriculum Sequencing and Validation: Integration in a Service-Oriented Architecture 

    Baldoni, M; Barogli, C; Brunkhorst, I; Marengo, E; Patti, V (Springer, 2007)
    We present a service-oriented personalization system, set in an educational framework, based on a semantic annotation of courses including prerequisites and learning objectives. The system supports users in planning ...
  • A REC-based commitment tracking tool (system demonstration) 

    Chesani, F; Mello, P; Montali, M; Torroni, P (AI*IA/TABOO, 2009)
  • Recency-Bounded Verification of Dynamic Database-Driven Systems 

    Abdulla PA; Aiswarya C; Atig MF; Montali M; Rezine O (ACM Press and Addison Wesley, 2016)
    We propose a formalism to model database-driven systems, called database manipulating systems (DMS). The actions of a DMS modify the current instance of a relational database by adding new elements into the database, ...
  • Recommendation-based browsing assistance for corporate knowledge portals 

    Zanker M; Gordea S (ACM, 2006)
    The management of knowledge, i.e. knowing what is known and the ability to exploit it is a burning issue for most organizations. Though knowledge management has a strong social perspective, information technology supports ...