Sciweavers

2527 search results - page 438 / 506
» A UML-Based Approach to System Testing
Sort
View
DOLAP
2000
ACM
15 years 4 months ago
Analyzing Clickstreams Using Subsessions
Analyzing data obtained from web server logs, so-called “clickstreams”, is rapidly becoming one of the most important activities for companies in any sector as most businesses...
Jesper Andersen, Anders Giversen, Allan H. Jensen,...
ICEIS
1999
IEEE
15 years 4 months ago
Contour Estimation on Piecewise Homogeneous Random Fields
: Contour Estimation, Bayesian Estimation, Random Fields, Dynamic Programming, Multigrid Methods. This paper addresses contour estimation on images modeled as piecewise homogeneous...
José A. Moinhos Cordeiro, José M. B....
VISUAL
1999
Springer
15 years 4 months ago
Genetic Algorithm for Weights Assignment in Dissimilarity Function for Trademark Retrieval
Abstract. Trademark image retrieval is becoming an important application for logo registry, veri cation, and design. There are two major problems about the current approaches to tr...
David Yuk-Ming Chan, Irwin King
ISPAN
1996
IEEE
15 years 4 months ago
Design and evaluation of an environment APE for automatic parallelization of programs
In this paper, we have presented the design and evaluation of a compiler system, called APE,for automatic parallelization of scientific and engineering applications on distributed...
Vipin Chaudhary, Cheng-Zhong Xu, Sumit Roy, Jialin...
COMPSAC
2007
IEEE
15 years 3 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie