Sciweavers

2748 search results - page 310 / 550
» Generating Object-Z Specifications from Use Cases
Sort
View
ACSAC
1999
IEEE
15 years 8 months ago
Tools to Support Secure Enterprise Computing
Secure enterprise programming is a difficult and tedious task. Programmers need tools that support t levels of abstraction and that track all the components that participate in di...
Myong H. Kang, Brian J. Eppinger, Judith N. Frosch...
KDD
1999
ACM
145views Data Mining» more  KDD 1999»
15 years 8 months ago
Discovery of Fraud Rules for Telecommunications - Challenges and Solutions
Many fraud analysis systemshave at their heart a rule-based enginefor generatingalertsaboutsuspiciousbehaviors.The rules in the systemareusually basedon expert knowledge. Automati...
Saharon Rosset, Uzi Murad, Einat Neumann, Yizhak I...
WSMAI
2004
15 years 5 months ago
Scalable Continuous Query System for Web Databases
Continuous Queries (CQ) help users to retrieve results as soon as they become available. The CQ keeps track of two important events. If there is any change in the source informatio...
Ather Saeed, Savitri Bevinakoppa
CHI
2009
ACM
16 years 4 months ago
Leveraging open-source software in the design and development process
This paper presents a case study of the NASA Ames Research Center HCI Group's design and development of a problem reporting system for NASA's next generation vehicle (to...
Collin Green, Irene Tollinger, Christian Ratterman...
ICDM
2007
IEEE
147views Data Mining» more  ICDM 2007»
15 years 8 months ago
Improving Knowledge Discovery in Document Collections through Combining Text Retrieval and Link Analysis Techniques
In this paper, we present Concept Chain Queries (CCQ), a special case of text mining in document collections focusing on detecting links between two topics across text documents. ...
Wei Jin, Rohini K. Srihari, Hung Hay Ho, Xin Wu