Sciweavers

1713 search results - page 190 / 343
» Analysis of Procedure Splitability
Sort
View
127
Voted
KDD
2010
ACM
218views Data Mining» more  KDD 2010»
15 years 4 months ago
Online multiscale dynamic topic models
We propose an online topic model for sequentially analyzing the time evolution of topics in document collections. Topics naturally evolve with multiple timescales. For example, so...
Tomoharu Iwata, Takeshi Yamada, Yasushi Sakurai, N...
FOAL
2007
ACM
15 years 4 months ago
Requirement enforcement by transformation automata
The goal of this work is to treat safety and security policies as requirements to be composed in an aspectual style with a developing application. Policies can be expressed either...
Douglas R. Smith
122
Voted
SP
2010
IEEE
222views Security Privacy» more  SP 2010»
15 years 4 months ago
A Symbolic Execution Framework for JavaScript
—As AJAX applications gain popularity, client-side JavaScript code is becoming increasingly complex. However, few automated vulnerability analysis tools for JavaScript exist. In ...
Prateek Saxena, Devdatta Akhawe, Steve Hanna, Feng...
99
Voted
BPM
2004
Springer
148views Business» more  BPM 2004»
15 years 4 months ago
Interactive Workflow Mining
Many information systems log event data about executed tasks. Workflow mining is concerned with the derivation of a graphical workflow model out of this data. Experience from appl...
Markus Hammori, Joachim Herbst, Niko Kleiner
108
Voted
APNOMS
2006
Springer
15 years 4 months ago
Improved Handoff Performance Based on Pre-binding Update in HMIPv6
Abstract. In this paper, an efficient neighbor AR (Access Router) discovery scheme and handoff procedure using neighbor information are proposed. It allows each AR and Mobility Anc...
Jongpil Jeong, Min Young Chung, Hyunseung Choo