Sciweavers

2309 search results - page 345 / 462
» Patterns for Technology Companies
Sort
View
WSE
2006
IEEE
15 years 10 months ago
Modeling Request Routing in Web Applications
For web applications, determining how requests from a web page are routed through server components can be time-consuming and error-prone due to the complex set of rules and mecha...
Minmin Han, Christine Hofmeister
ASSETS
2006
ACM
15 years 10 months ago
Attention analysis in interactive software for children with autism
This work is a part of an ongoing project that focuses on potential applications of an interactive system that helps children with autism. Autism is classified as a neurodevelopm...
A. Ould Mohamed, Vincent Courboulay, Karim Sehaba,...
139
Voted
WIRI
2005
IEEE
15 years 10 months ago
Collaborative Filtering by Mining Association Rules from User Access Sequences
Recent research in mining user access patterns for predicting Web page requests focuses only on consecutive sequential Web page accesses, i.e., pages which are accessed by followi...
Mei-Ling Shyu, Choochart Haruechaiyasak, Shu-Ching...
141
Voted
MM
2005
ACM
140views Multimedia» more  MM 2005»
15 years 10 months ago
Web image clustering by consistent utilization of visual features and surrounding texts
Image clustering, an important technology for image processing, has been actively researched for a long period of time. Especially in recent years, with the explosive growth of th...
Bin Gao, Tie-Yan Liu, Tao Qin, Xin Zheng, QianShen...
SWS
2004
ACM
15 years 10 months ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang