Sciweavers

2984 search results - page 316 / 597
» Method engineering process patterns
Sort
View
127
Voted
CHI
2005
ACM
16 years 2 months ago
Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing
We argue that an analytic proportionality assessment balancing usefulness and burden on individual or group privacy must be conducted throughout the design process to create accep...
Giovanni Iachello, Gregory D. Abowd
ISESE
2006
IEEE
15 years 8 months ago
Empirical estimates of software availability of deployed systems
We consider empirical evaluation of the availability of the deployed software. Evaluation of real systems is more realistic, more accurate, and provides higher level of confidenc...
Audris Mockus
ICSM
1997
IEEE
15 years 6 months ago
Software Change Through Design Maintenance
Conventional software engineering tends to focus on a small part of the software life cycle: the design and implementation of a product. The bulk of the lifetime cost is in the ma...
Ira D. Baxter, Christopher Pidgeon
ICMCS
2009
IEEE
199views Multimedia» more  ICMCS 2009»
15 years 8 days ago
Association rule mining in multiple, multidimensional time series medical data
Time series pattern mining (TSPM) finds correlations or dependencies in same series or in multiple time series. When the numerous instances of multiple time series data are associ...
Gaurav N. Pradhan, B. Prabhakaran
123
Voted
ANCS
2006
ACM
15 years 6 months ago
Efficient memory utilization on network processors for deep packet inspection
Deep Packet Inspection (DPI) refers to examining both packet header and payload to look for predefined patterns, which is essential for network security, intrusion detection and c...
Piti Piyachon, Yan Luo