Sciweavers

2740 search results - page 367 / 548
» A Model-Based Approach To Requirements Analysis
Sort
View
140
Voted
CISS
2008
IEEE
15 years 3 months ago
Detection of anomalous meetings in a social network
Abstract-- When monitoring interactions within a social network, meetings or contacts between different members of the network are recorded. This paper addresses the problem of usi...
Jorge Silva, Rebecca Willett
138
Voted
AR
2008
143views more  AR 2008»
15 years 3 months ago
Toward Human-Like Real-Time Manipulation: From Perception to Motion Planning
Human-like behavior is crucial for intelligent service robots that are to perform versatile tasks in day to day life. In this paper, an integrated approach to human-like manipulat...
Sukhan Lee, Hadi Moradi, Daesik Jang, Han-Young Ja...
140
Voted
IJDMMM
2008
119views more  IJDMMM 2008»
15 years 3 months ago
A relational perspective on spatial data mining
: Remote sensing and mobile devices nowadays collect a huge amount of spatial data, which have to be analysed in order to discover interesting information about economic, social an...
Donato Malerba
115
Voted
JOT
2006
113views more  JOT 2006»
15 years 3 months ago
Constraint Validation in Model Compilers
Model transformation has become one of the most focused research field, motivated by for instance the OMG's Model-Driven Architecture (MDA). Metamodeling is a central techniq...
László Lengyel, Tihamer Levendovszky...
143
Voted
FUIN
2007
147views more  FUIN 2007»
15 years 3 months ago
Privacy Preserving Database Generation for Database Application Testing
Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively few efforts ...
Xintao Wu, Yongge Wang, Songtao Guo, Yuliang Zheng