Sciweavers

1677 search results - page 221 / 336
» An Interactive Fur Modeling Technique
Sort
View
131
Voted
STAIRS
2008
169views Education» more  STAIRS 2008»
15 years 2 months ago
Probabilistic Association Rules for Item-Based Recommender Systems
Since the beginning of the 1990's, the Internet has constantly grown, proposing more and more services and sources of information. The challenge is no longer to provide users ...
Sylvain Castagnos, Armelle Brun, Anne Boyer
107
Voted
IJCAI
2003
15 years 2 months ago
ODISET: On-line Distributed Session Tracing using Agents
When a security incident occurs it is sometimes necessary to identify its causes for legal and cautionary purposes. In an attempt to hide the origin of her connection, a malicious...
Salvador Mandujano, Arturo Galván
88
Voted
JUCS
2006
108views more  JUCS 2006»
15 years 20 days ago
Defining Atomic Composition in UML Behavioral Diagrams
Abstract: UML may be used to describe both the structure and behavior of objectoriented systems using a combination of notations. For the modeling of the dynamic behavior, a number...
Júlio Henrique Araújo Pereira Machad...
110
Voted
ER
2010
Springer
121views Database» more  ER 2010»
14 years 11 months ago
Reasoning with Optional and Preferred Requirements
Abstract. Of particular concern in requirements engineering is the selection of requirements to implement in the next release of a system. To that end, there has been recent work o...
Neil A. Ernst, John Mylopoulos, Alexander Borgida,...
124
Voted
ASIACRYPT
2011
Springer
14 years 21 days ago
Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge
A fundamental question in cryptography deals with understanding the role that randomness plays in cryptographic protocols and to what extent it is necessary. One particular line o...
Yi Deng, Dengguo Feng, Vipul Goyal, Dongdai Lin, A...