Sciweavers

3441 search results - page 617 / 689
» Provenance of Software Development Processes
Sort
View
DAC
1998
ACM
16 years 2 months ago
Watermarking Techniques for Intellectual Property Protection
Digital system designs are the product of valuable effort and knowhow. Their embodiments, from software and HDL program down to device-level netlist and mask data, represent caref...
Andrew B. Kahng, John Lach, William H. Mangione-Sm...
WWW
2001
ACM
16 years 1 months ago
A Logic-based Framework for Mobile Intelligent Information Agents
Information agents are computational software systems that provides transparent access to many different information sources in the Internet, and to be able to retrieve, analyze, ...
Naoki Fukuta, Takayuki Ito, Toramatsu Shintani
103
Voted
KDD
2007
ACM
335views Data Mining» more  KDD 2007»
16 years 1 months ago
Detecting changes in large data sets of payment card data: a case study
An important problem in data mining is detecting changes in large data sets. Although there are a variety of change detection algorithms that have been developed, in practice it c...
Chris Curry, Robert L. Grossman, David Locke, Stev...
97
Voted
CHI
2006
ACM
16 years 1 months ago
The design of an interactive and dynamic representation of the firm
Interpretation and audit of financial information is a significant undertaking that must rest on a fuller understanding of the firm and its operations. A pictorial representation ...
Lin Zhao, Julia Grant, Fred L. Collopy
100
Voted
CHI
2005
ACM
16 years 1 months ago
Participatory design of an orientation aid for amnesics
We present the participatory design and evaluation of an orientation aid for individuals who have anterograde amnesia. Our design team included six amnesics who have extreme diffi...
Mike Wu, Ronald Baecker, Brian Richards