Sciweavers

36320 search results - page 6935 / 7264
» From Code to Models
Sort
View
147
Voted
IUI
2003
ACM
15 years 10 months ago
Personal choice point: helping users visualize what it means to buy a BMW
How do we know if we can afford a particular purchase? We can find out what the payments might be and check our balances on various accounts, but does this answer the question? Wh...
Andrew E. Fano, Scott W. Kurth
MIR
2003
ACM
174views Multimedia» more  MIR 2003»
15 years 10 months ago
Content-based image retrieval by clustering
In a typical content-based image retrieval (CBIR) system, query results are a set of images sorted by feature similarities with respect to the query. However, images with high fea...
Yixin Chen, James Ze Wang, Robert Krovetz
SACMAT
2003
ACM
15 years 10 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
128
Voted
SIGUCCS
2003
ACM
15 years 10 months ago
Escaping the quicksand and getting back on the trail of team projects
Working in a team environment can be either an efficient and productive means of completing projects or a nightmare where the project never seems to end. Most of us have been a pa...
Steven K. Brawn, Kelly Caye, R. Mark Koan
ATAL
2003
Springer
15 years 10 months ago
Customizing AOSE methodologies by reusing AOSE features
Future large-scale software development projects will require engineering support for a diverse range of software quality attributes, such as privacy and openness. It is not feasi...
Thomas Juan, Leon Sterling, Maurizio Martelli, Viv...
« Prev « First page 6935 / 7264 Last » Next »