Sciweavers

933 search results - page 159 / 187
» A Data Model to Support End User Software Engineering
Sort
View
FASE
2008
Springer
14 years 11 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
CIKM
2009
Springer
15 years 4 months ago
Feature selection for ranking using boosted trees
Modern search engines have to be fast to satisfy users, so there are hard back-end latency requirements. The set of features useful for search ranking functions, though, continues...
Feng Pan, Tim Converse, David Ahn, Franco Salvetti...
GIS
2006
ACM
15 years 10 months ago
Optimization of multiple continuous queries over streaming satellite data
Remotely sensed data, in particular satellite imagery, play many important roles in environmental applications and models. In particular applications that study (rapid) changes in...
Quinn Hart, Michael Gertz
HT
1997
ACM
15 years 1 months ago
Workspaces: The HyperDisco Approach to Internet Distribution
Hypermedia concepts are currently being deployed in a variety of information systems such as the World Wide Web, software development environments, large engineering enterprises, ...
Uffe Kock Wiil, John J. Leggett
WSDM
2012
ACM
258views Data Mining» more  WSDM 2012»
13 years 5 months ago
Large-scale analysis of individual and task differences in search result page examination strategies
Understanding the impact of individual and task differences on search result page examination strategies is important in developing improved search engines. Characterizing these e...
Georg Buscher, Ryen W. White, Susan T. Dumais, Jef...