Sciweavers

2216 search results - page 361 / 444
» Integration of Usability Techniques into the Software Develo...
Sort
View
ICDE
2009
IEEE
138views Database» more  ICDE 2009»
14 years 7 months ago
Similarity Group-By
The identification and processing of similarities in the data play a key role in multiple application scenarios. Several types of similarity-aware operations have been studied in ...
Yasin N. Silva, Walid G. Aref, Mohamed H. Ali
BNCOD
2003
138views Database» more  BNCOD 2003»
14 years 11 months ago
Aggregate Table-Driven Querying via Navigation Ontologies in Distributed Statistical Databases
In this paper we describe a query paradigm based on ontologies, aggregate table-driven querying and expansion of QBE. It has two novel features: visually specifying aggregate table...
Yaxin Bi, David A. Bell, Joanne Lamb
RAID
2010
Springer
14 years 8 months ago
Automatic Discovery of Parasitic Malware
Malicious software includes functionality designed to block discovery or analysis by defensive utilities. To prevent correct attribution of undesirable behaviors to the malware, it...
Abhinav Srivastava, Jonathon T. Giffin
TITB
2002
76views more  TITB 2002»
14 years 9 months ago
Technology improvements for image-guided and minimally invasive spine procedures
This paper reports on technology developments aimed at improving the state of the art for image-guided minimally invasive spine procedures. Back pain is a major health problem with...
Kevin Cleary, Mark Clifford, Dan Stoianovici, Matt...
OOPSLA
2004
Springer
15 years 3 months ago
Modeling event driven applications with a specification language (MEDASL)
Radio Frequency Identification (RFID) technology provides the means to track any object, any time, anywhere with Electronic Product Codes (EPC). A major consequence of this techno...
Murali Kaundinya, Ali Syed