Sciweavers

1051 search results - page 98 / 211
» Adaptive User Modelling in AthosMail
Sort
View
SE
2007
15 years 6 months ago
Enterprise application deployment: A model driven approach
Abstract: Today’s enterprise applications are based on numerous interrelated components that capture domain-specific, generic or infrastructural functionality. Each component is...
Peter Golibrzuch, Alexander Holbreich, Simon Zambr...
CORR
2008
Springer
99views Education» more  CORR 2008»
15 years 5 months ago
A Model-Based Frequency Constraint for Mining Associations from Transaction Data
Mining frequent itemsets is a popular method for finding associated items in databases. For this method, support, the co-occurrence frequency of the items which form an associatio...
Michael Hahsler
3DPVT
2004
IEEE
137views Visualization» more  3DPVT 2004»
15 years 8 months ago
Realistic Models of Children Heads from 3D-MRI Segmentation and Tetrahedral Mesh Construction
In order to analyze the sensitivity of children to RF fields and mobile phones in particular, the SAR (Specific Absorption Ratio) defined as the power absorbed by a unit of mass o...
Jasmine Burguet, Najib Gadi, Isabelle Bloch
RE
2010
Springer
14 years 11 months ago
A goal-based framework for contextual requirements modeling and analysis
Abstract Requirements Engineering (RE) research often ignores, or presumes a uniform nature of the context in which the system operates. This assumption is no longer valid in emerg...
Raian Ali, Fabiano Dalpiaz, Paolo Giorgini
CEAS
2008
Springer
15 years 6 months ago
Improved Phishing Detection using Model-Based Features
Phishing emails are a real threat to internet communication and web economy. Criminals are trying to convince unsuspecting online users to reveal passwords, account numbers, socia...
André Bergholz, Jeong Ho Chang, Gerhard Paa...