Sciweavers

8377 search results - page 1674 / 1676
» Scenarios - Introduction
Sort
View
SDM
2012
SIAM
340views Data Mining» more  SDM 2012»
12 years 12 months ago
IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems
A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a situation-aware system that responds intelligently t...
Lu An Tang, Quanquan Gu, Xiao Yu, Jiawei Han, Thom...
EDBT
2012
ACM
315views Database» more  EDBT 2012»
12 years 12 months ago
Sieve: linked data quality assessment and fusion
The Web of Linked Data grows rapidly and already contains data originating from hundreds of data sources. The quality of data from those sources is very diverse, as values may be ...
Pablo N. Mendes, Hannes Mühleisen, Christian ...
125
Voted
ICSE
2012
IEEE-ACM
12 years 12 months ago
WitchDoctor: IDE support for real-time auto-completion of refactorings
—Integrated Development Environments (IDEs) have come to perform a wide variety of tasks on behalf of the programmer, refactoring being a classic example. These operations have u...
Stephen R. Foster, William G. Griswold, Sorin Lern...
WWW
2007
ACM
15 years 10 months ago
Netprobe: a fast and scalable system for fraud detection in online auction networks
Given a large online network of online auction users and their histories of transactions, how can we spot anomalies and auction fraud? This paper describes the design and implemen...
Shashank Pandit, Duen Horng Chau, Samuel Wang, Chr...
TFM
2009
Springer
252views Formal Methods» more  TFM 2009»
15 years 4 months ago
Abstraction and Modelling: A Complementary Partnership
action and Modelling - a complementary partnership” 10h30 – 11h 00 Coffee break 11h-12h30 Session 1 “Model Transformation: Foundations” Algebraic models for bidirectional m...
Jeffrey Kramer
« Prev « First page 1674 / 1676 Last » Next »