Sciweavers

1100 search results - page 42 / 220
» From Goals to Aspects: Discovering Aspects from Requirements...
Sort
View
ICDM
2005
IEEE
148views Data Mining» more  ICDM 2005»
15 years 7 months ago
Hot Item Mining and Summarization from Multiple Auction Web Sites
Online auction Web sites are fast changing, highly dynamic, and complex as they involve tremendous sellers and potential buyers, as well as a huge amount of items listed for biddi...
Tak-Lam Wong, Wai Lam
91
Voted
WWW
2001
ACM
16 years 2 months ago
Designing personalized web applications
The goal of this paper is to argue the need to approach the personalization issues in Web applications from the very beginning in the application's development cycle. Since p...
Daniel Schwabe, Gustavo Rossi, Robson Guimar&atild...
PAM
2010
Springer
15 years 8 months ago
Extracting Intra-domain Topology from mrinfo Probing
Active and passive measurements for topology discovery have known an impressive growth during the last decade. If a lot of work has been done regarding inter-domain topology discov...
Jean-Jacques Pansiot, Pascal Mérindol, Beno...
ICAT
2003
IEEE
15 years 7 months ago
A Formalism and a Tool for Diverging Requirements in VR Scenario Modeling
Any VR scenario should offer a certain degree of nonlinearity or openness regarding the story progress as a consequence of the interaction with the user. In this paper we propose ...
Richard Wages, Benno Grützmacher, Georg Troge...
121
Voted
TIT
2008
187views more  TIT 2008»
15 years 1 months ago
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement
Abstract--In the bounded-storage model (BSM) for information-theoretic secure encryption and key agreement, one makes use of a random string R whose length t is greater than the as...
Stefan Dziembowski, Ueli M. Maurer