Sciweavers

4445 search results - page 147 / 889
» Reflective Authorization Systems
Sort
View
CORR
2010
Springer
93views Education» more  CORR 2010»
15 years 4 months ago
Support for Evolving Software Architectures in the ArchWare ADL
Software that cannot evolve is condemned to atrophy: it cannot accommodate the constant revision and renegotiation of its business goals nor intercept the potential of new technol...
Ronald Morrison, Graham N. C. Kirby, Dharini Balas...
KDD
2001
ACM
163views Data Mining» more  KDD 2001»
16 years 4 months ago
The "DGX" distribution for mining massive, skewed data
Skewed distributions appear very often in practice. Unfortunately, the traditional Zipf distribution often fails to model them well. In this paper, we propose a new probability di...
Zhiqiang Bi, Christos Faloutsos, Flip Korn
ASE
2006
110views more  ASE 2006»
15 years 4 months ago
Runtime recovery and manipulation of software architecture of component-based systems
Recently, more attention is paid to the researches and practices on how to use software architecture in software maintenance and evolution to reduce their complexity and cost. The ...
Gang Huang, Hong Mei, Fuqing Yang
COMCOM
2010
133views more  COMCOM 2010»
15 years 4 months ago
Measuring long-term location privacy in vehicular communication systems
Vehicular communication systems are an emerging form of communication that enables new ways of cooperation among vehicles, traffic operators, and service providers. However, many ...
Zhendong Ma, Frank Kargl, Michael Weber
PICS
2003
15 years 5 months ago
Selection of Training Sets for the Characterisation of Multispectral Imaging Systems
To establish a correlation between the system output and the corresponding reflectance, the system characterisation functionDeriving the actual multispectral data from the output o...
Paolo Pellegri, Gianluca Novati, Raimondo Schettin...