Sciweavers

2704 search results - page 460 / 541
» Constraint Management in Engineering of Complex Information ...
Sort
View
KES
2006
Springer
15 years 1 months ago
Automatic Discovery of Basic Motion Classification Rules
There is a keen demand for a method of sharing better work practices in a factory because better work practices are the key to improving productivity. We have developed a system th...
Satoshi Hori, Mizuho Sasaki, Hirokazu Taki
IDA
2002
Springer
15 years 1 months ago
Online classification of nonstationary data streams
Most classification methods are based on the assumption that the data conforms to a stationary distribution. However, the real-world data is usually collected over certain periods...
Mark Last
CHIMIT
2007
ACM
15 years 5 months ago
Network-centricity: hindered by hierarchical anchors
Network-centricity is a concept under consideration as a useful paradigm for complex organizational operations, combining the strengths of bureaucracy with the innovative possibil...
Steve Abrams, Gloria Mark
SIGSOFT
2008
ACM
16 years 2 months ago
Marple: a demand-driven path-sensitive buffer overflow detector
Despite increasing efforts in detecting and managing software security vulnerabilities, the number of security attacks is still rising every year. As software becomes more complex...
Wei Le, Mary Lou Soffa
ICSE
1999
IEEE-ACM
15 years 5 months ago
Experience with Performing Architecture Tradeoff Analysis
Software architectures, like complex designs in any field, embody tradeoffs made by the designers. However, these tradeoffs are not always made explicitly by the designers and the...
Rick Kazman, Mario Barbacci, Mark Klein, S. Jeromy...