Sciweavers

242 search results - page 43 / 49
» Building an interaction design pattern language: A case stud...
Sort
View
92
Voted
B
2007
Springer
15 years 1 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
PADL
2010
Springer
15 years 6 months ago
Similar Code Detection and Elimination for Erlang Programs
A well-known bad code smell in refactoring and software maintenance is duplicated code, that is the existence of code clones, which are code fragments that are identical or similar...
Huiqing Li, Simon Thompson
CHI
2011
ACM
14 years 1 months ago
Data cracker: developing a visual game analytic tool for analyzing online gameplay
Game analytics is a domain that focuses on the systems and methods used to analyze game-related data. In this paper we present how a visual game analytic tool can be developed to ...
Ben Medler, Michael John, Jeff Lane
EDBT
2012
ACM
228views Database» more  EDBT 2012»
12 years 12 months ago
Towards scalable data integration under constraints
In this paper we consider the problem of answering queries using views, with or without ontological constraints, which is important for data integration, query optimization, and d...
George Konstantinidis, José Luis Ambite
BMCBI
2008
226views more  BMCBI 2008»
14 years 9 months ago
ProteoLens: a visual analytic tool for multi-scale database-driven biological network data mining
Background: New systems biology studies require researchers to understand how interplay among myriads of biomolecular entities is orchestrated in order to achieve high-level cellu...
Tianxiao Huan, Andrey Y. Sivachenko, Scott H. Harr...