Sciweavers

8781 search results - page 1658 / 1757
» Enterprise Model Integration
Sort
View
FM
2006
Springer
153views Formal Methods» more  FM 2006»
15 years 9 months ago
Formal Methods and Cryptography
Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsy...
Michael Backes, Birgit Pfitzmann, Michael Waidner
FM
2006
Springer
172views Formal Methods» more  FM 2006»
15 years 9 months ago
The Embedded Systems Design Challenge
We summarize some current trends in embedded systems design and point out some of their characteristics, such as the chasm between analytical and computational models, and the gap ...
Thomas A. Henzinger, Joseph Sifakis
ICSE
2000
IEEE-ACM
15 years 9 months ago
Software engineering and performance: a road-map
Software engineering has traditionally focussed on functional requirements and how to build software that has few bugs and can be easily maintained. Most design approaches include...
Rob Pooley
SIGUCCS
2000
ACM
15 years 9 months ago
Developing and Implementing a Comprehensive Training and Incentive Program for Student Employees in Information Technology
Anyone who works with student employees knows that while it is often difficult to train sufficiently, it is of the utmost importance to have a qualified, knowledgeable staff. We w...
Jim Osborn
KDD
2010
ACM
247views Data Mining» more  KDD 2010»
15 years 7 months ago
Active learning for biomedical citation screening
Active learning (AL) is an increasingly popular strategy for mitigating the amount of labeled data required to train classifiers, thereby reducing annotator effort. We describe ...
Byron C. Wallace, Kevin Small, Carla E. Brodley, T...
« Prev « First page 1658 / 1757 Last » Next »