Sciweavers

3604 search results - page 137 / 721
» All Common Subsequences
Sort
View
ADCOG
2004
15 years 5 months ago
Social and Ethical Considerations in Virtual Worlds
While networking technology facilitates the use of online services such as real-time instant messaging and anywhere-anytime multiplayer gaming, societal and ethical issues can inf...
Robert W. Kerbs
DAGSTUHL
2006
15 years 5 months ago
Aspect-Oriented Techniques for Web Services: a Model-Driven Approach
In order to tackle the entire web service life cycle, it is necessary to face how to model systems based on service functionality and also how to add extra-functional properties to...
Guadalupe Ortiz, Juan Hernández
ISICT
2004
15 years 5 months ago
Preventing type flaw attacks on security protocols with a simplified tagging scheme
A type flaw attack on a security protocol is an attack where a field in a message that was originally intended to have one type is subsequently interpreted as having another type. ...
Yafen Li, Wuu Yang, Ching-Wei Huang
ICMLA
2003
15 years 5 months ago
Fast Class-Attribute Interdependence Maximization (CAIM) Discretization Algorithm
– Discretization is a process of converting a continuous attribute into an attribute that contains small number of distinct values. One of the major reasons for discretizing an a...
Lukasz A. Kurgan, Krzysztof J. Cios
WICSA
2001
15 years 5 months ago
Focus: A Light-Weight, Incremental Approach to Software Architecture Recovery and Evolution
During the past decade, object-orientation (OO) has become the dominant software development methodology, accompanied by a number of modeling notations, programming languages, and...
Lei Ding, Nenad Medvidovic