Sciweavers

4636 search results - page 780 / 928
» Application of Linguistic Techniques for Use Case Analysis
Sort
View
89
Voted
JSS
2010
120views more  JSS 2010»
14 years 9 months ago
An evaluation of timed scenario notations
There is a general consensus on the importance of good Requirements Engineering (RE) for achieving high quality software. The modeling and analysis of requirements have been the m...
Jameleddine Hassine, Juergen Rilling, Rachida Dsso...
100
Voted
CIKM
2006
Springer
15 years 2 months ago
On the structural properties of massive telecom call graphs: findings and implications
With ever growing competition in telecommunications markets, operators have to increasingly rely on business intelligence to offer the right incentives to their customers. Toward ...
Amit Anil Nanavati, Siva Gurumurthy, Gautam Das, D...
113
Voted
BMCBI
2011
14 years 2 months ago
Evaluating methods for ranking differentially expressed genes applied to MicroArray Quality Control data
Background: Statistical methods for ranking differentially expressed genes (DEGs) from gene expression data should be evaluated with regard to high sensitivity, specificity, and r...
Koji Kadota, Kentaro Shimizu
ICAIL
2005
ACM
15 years 4 months ago
Effective Document Clustering for Large Heterogeneous Law Firm Collections
Computational resources for research in legal environments have historically implied remote access to large databases of legal documents such as case law, statutes, law reviews an...
Jack G. Conrad, Khalid Al-Kofahi, Ying Zhao, Georg...
87
Voted
FC
1998
Springer
96views Cryptology» more  FC 1998»
15 years 3 months ago
Compliance Checking in the PolicyMaker Trust Management System
Emerging electronic commerce services that use public-key cryptography on a mass-market scale require sophisticated mechanisms for managing trust. For example, any service that rec...
Matt Blaze, Joan Feigenbaum, Martin Strauss