Sciweavers

1781 search results - page 56 / 357
» An Emerging Need for a New Software Engineering Method
Sort
View
97
Voted
CAD
2004
Springer
15 years 11 days ago
Local topological beautification of reverse engineered models
Boundary representation models reconstructed from 3D range data suffer from various inaccuracies caused by noise in the data and by numerical errors in the model building software...
C. H. Gao, Frank C. Langbein, A. David Marshall, R...
86
Voted
COMPSAC
2005
IEEE
15 years 2 months ago
A Novel Method for Protecting Sensitive Knowledge in Association Rules Mining
Discovering frequent patterns from huge amounts of data is one of the most studied problems in data mining. However, some sensitive patterns with security policies may cause a thr...
En Tzu Wang, Guanling Lee, Yu Tzu Lin
ICSM
2003
IEEE
15 years 5 months ago
Mining Design Patterns from C++ Source Code
Design patterns are micro architectures that have proved to be reliable, easy-to implement and robust. There is a need in science and industry for recognizing these patterns. We p...
Zsolt Balanyi, Rudolf Ferenc
90
Voted
UIST
1998
ACM
15 years 4 months ago
Of Vampire Mirrors and Privacy Lamps: Privacy Management in Multi-User Augmented Environments
We consider the problem of privacy in a 3D multi-user collaborative environment. We assume that information objects are represented by visual icons, and can either be public or pr...
Andreas Butz, Clifford Beshers, Steven Feiner
JSCIC
2010
57views more  JSCIC 2010»
14 years 7 months ago
A Proof of the Stability of the Spectral Difference Method for All Orders of Accuracy
While second order methods for computational simulations of fluid flow provide the basis of widely used commercial software, there is a need for higher order methods for more accur...
Antony Jameson