Sciweavers

876 search results - page 167 / 176
» Integrating Preferences into Goal Models for Requirements En...
Sort
View
SMC
2007
IEEE
125views Control Systems» more  SMC 2007»
15 years 6 months ago
Scaling with digital connection: Services innovation
—Digitization of production factors, including the knowledge for knowledge workers and consumers, opens almost infinite potential to connect persons, systems, processes, enterpri...
Cheng Hsu
TASE
2011
IEEE
14 years 6 months ago
A Totally Decoupled Piezo-Driven XYZ Flexure Parallel Micropositioning Stage for Micro/Nanomanipulation
—This paper reports the design and development processes of a totally decoupled flexure-based XYZ parallel-kinematics micropositioning stage with piezoelectric actuation. The un...
Yangmin Li, Qingsong Xu
SIGIR
2009
ACM
15 years 6 months ago
Global ranking by exploiting user clicks
It is now widely recognized that user interactions with search results can provide substantial relevance information on the documents displayed in the search results. In this pape...
Shihao Ji, Ke Zhou, Ciya Liao, Zhaohui Zheng, Gui-...
SACMAT
2003
ACM
15 years 4 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
PLDI
2009
ACM
15 years 6 months ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...