Sciweavers

1288 search results - page 216 / 258
» On Analysis of Design Component Contracts: A Case Study
Sort
View
ISSA
2008
15 years 2 months ago
The Principle of Security Safeguards: Accidental Activities
The principle of information security safeguards is a key information principle contained in every privacy legislation measure, framework, and guideline. This principle requires d...
Rasika Dayarathna
RTS
2008
131views more  RTS 2008»
15 years 28 days ago
A constant-time dynamic storage allocator for real-time systems
Dynamic memory allocation has been used for decades. However, it has seldom been used in real-time systems since the worst case of spatial and temporal requirements for allocation ...
Miguel Masmano, Ismael Ripoll, Patricia Balbastre,...
KDD
2006
ACM
272views Data Mining» more  KDD 2006»
16 years 1 months ago
YALE: rapid prototyping for complex data mining tasks
KDD is a complex and demanding task. While a large number of methods has been established for numerous problems, many challenges remain to be solved. New tasks emerge requiring th...
Ingo Mierswa, Michael Wurst, Ralf Klinkenberg, Mar...
CHI
2005
ACM
16 years 1 months ago
Beyond being in the lab: using multi-agent modeling to isolate competing hypotheses
In studies of virtual teams, it is difficult to determine pure effects of geographic isolation and uneven communication technology. We developed a multi-agent computer model in Ne...
Ning Nan, Erik W. Johnston, Judith S. Olson, Natha...
ICMCS
2006
IEEE
181views Multimedia» more  ICMCS 2006»
15 years 7 months ago
Toward Intelligent Use of Semantic Information on Subspace Discovery for Image Retrieval
Image retrieval has been widely used in many fields of science and engineering. The semantic concept of user interest is obtained by a learning process. Traditional techniques oft...
Jie Yu, Qi Tian