Sciweavers

489 search results - page 92 / 98
» Reasoning about confidentiality at requirements engineering ...
Sort
View
134
Voted
ASE
2004
137views more  ASE 2004»
15 years 8 days ago
Automatically Restructuring Programs for the Web
The construction of interactive server-side Web applications differs substantially from the construction of traditional interactive programs. In contrast, existing Web programming...
Jacob Matthews, Robert Bruce Findler, Paul T. Grau...
124
Voted
AVI
2010
14 years 9 months ago
An infrastructure for creating graphical indicators of the learner profile by mashing up different sources
The procedures to collect information about users are well known in computer science till long time. They range from getting explicit information from users, required in order to ...
Luca Mazzola, Riccardo Mazza
IUI
2011
ACM
14 years 3 months ago
ChemInk: a natural real-time recognition system for chemical drawings
We describe a new sketch recognition framework for chemical structure drawings that combines multiple levels of visual features using a jointly trained conditional random field. ...
Tom Y. Ouyang, Randall Davis
CODES
2005
IEEE
15 years 6 months ago
Designing real-time H.264 decoders with dataflow architectures
High performance microprocessors are designed with generalpurpose applications in mind. When it comes to embedded applications, these architectures typically perform controlintens...
Youngsoo Kim, Suleyman Sair
123
Voted
INFSOF
2007
139views more  INFSOF 2007»
15 years 9 days ago
Predicting software defects in varying development lifecycles using Bayesian nets
An important decision problem in many software projects is when to stop testing and release software for use. For many software products, time to market is critical and therefore ...
Norman E. Fenton, Martin Neil, William Marsh, Pete...