Sciweavers

3090 search results - page 515 / 618
» Document Processing with LinkIT
Sort
View
101
Voted
CCS
2007
ACM
15 years 6 months ago
Improving vulnerability discovery models
Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
Andy Ozment
KDD
2007
ACM
124views Data Mining» more  KDD 2007»
15 years 6 months ago
Hierarchical mixture models: a probabilistic analysis
Mixture models form one of the most widely used classes of generative models for describing structured and clustered data. In this paper we develop a new approach for the analysis...
Mark Sandler
119
Voted
SSDBM
2006
IEEE
197views Database» more  SSDBM 2006»
15 years 6 months ago
InterJoin: Exploiting Indexes and Materialized Views in XPath Evaluation
XML has become the standard for data exchange for a wide variety of applications, particularly in the scientific community. In order to efficiently process queries on XML repres...
Derek Phillips, Ning Zhang 0002, Ihab F. Ilyas, M....
ECBS
2005
IEEE
88views Hardware» more  ECBS 2005»
15 years 6 months ago
Integrative Architecture Elicitation for Large Computer Based Systems
Large and complex computer based systems are the result of an evolution process which may take many years. Heterogeneity is an important characteristic of such systems: During the...
Peter Tabeling, Bernhard Gröne
GI
2005
Springer
15 years 6 months ago
Automated Quality Assurance for UML Models
Abstract: Model based development, like proposed by the OMG’s Model Driven Arre (MDA), aims to raise the level of abstraction from working on the code to working with models. For...
Tilman Seifert, Florian Jug, Günther Rackl