Sciweavers

1969 search results - page 298 / 394
» Incremental Processing and Acceptability
Sort
View
AOSD
2004
ACM
15 years 10 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh
ECUMN
2004
Springer
15 years 10 months ago
Expedited Forwarding Delay Budget Through a Novel Call Admission Control
Abstract. Call admission control is a principal component for QoS delivery in IP networks. It determines the extent to which network resources are utilized. It determines also whet...
Hamada Alshaer, Eric Horlait
GCC
2004
Springer
15 years 10 months ago
Image-Based Walkthrough over Internet on Mobile Devices
Real-time rendering of complex 3D scene on mobile devices is a challenging task. The main reason is that mobile devices have limited computational capabilities and are lack of powe...
Yu Lei, Zhongding Jiang, Deren Chen, Hujun Bao
132
Voted
UML
2004
Springer
15 years 10 months ago
Software Architecture Description and UML
The description of software architectures has always been concerned with the definition of the appropriate languages for designing the various architectural artifacts. Over the pa...
Paris Avgeriou, Nicolas Guelfi, Nenad Medvidovic
146
Voted
VLDB
2004
ACM
127views Database» more  VLDB 2004»
15 years 10 months ago
Computing Frequent Itemsets Inside Oracle 10G
1 Frequent itemset counting is the first step for most association rule algorithms and some classification algorithms. It is the process of counting the number of occurrences of ...
Wei Li, Ari Mozes