Sciweavers

2748 search results - page 198 / 550
» Generating Object-Z Specifications from Use Cases
Sort
View
221
Voted
ICDE
2009
IEEE
147views Database» more  ICDE 2009»
16 years 2 months ago
Separating Authentication from Query Execution in Outsourced Databases
-- In the database outsourcing paradigm, a data owner (DO) delegates its DBMS administration to a specialized service provider (SP) that receives and processes queries from clients...
Stavros Papadopoulos, Dimitris Papadias, Weiwei Ch...
RSP
2005
IEEE
107views Control Systems» more  RSP 2005»
15 years 6 months ago
Rapid Prototyping of Embedded Software Using Selective Formalism
Our software synthesis tool, CSP++, generates C++ source code from verifiable CSPm specifications, and includes a framework for runtime execution. Our technique of selective for...
John D. Carter, Ming Xu, William B. Gardner
ANNPR
2006
Springer
15 years 4 months ago
Incremental Training of Support Vector Machines Using Truncated Hypercones
We discuss incremental training of support vector machines in which we approximate the regions, where support vector candidates exist, by truncated hypercones. We generate the trun...
Shinya Katagiri, Shigeo Abe
110
Voted
AAAI
1994
15 years 2 months ago
Retrieving Semantically Distant Analogies with Knowledge-Directed Spreading Activation
Techniques that traditionally have been useful for retrieving same-domain analogies from small single-use knowledge bases, such as spreading activation and indexing on selected fe...
Michael Wolverton, Barbara Hayes-Roth
106
Voted
ACL
2010
14 years 10 months ago
Hunting for the Black Swan: Risk Mining from Text
In the business world, analyzing and dealing with risk permeates all decisions and actions. However, to date, risk identification, the first step in the risk management cycle, has...
Jochen L. Leidner, Frank Schilder