Sciweavers

12637 search results - page 2371 / 2528
» Security for Extensible Systems
Sort
View
WCRE
2008
IEEE
15 years 11 months ago
FAMOOSr 2008: Workshop on FAMIX and Moose in Software Reengineering
The increasing amount of data available about software systems poses new challenges for re- and reverse engineering research, as the proposed approaches need to scale. In this con...
Stéphane Ducasse, Tudor Gîrba, Orla G...
GLOBECOM
2007
IEEE
15 years 11 months ago
On Finite-SNR Diversity-Multiplexing Tradeoff
— Diversity–multiplexing tradeoff (DMT) presents a compact framework to compare various MIMO systems and channels in terms of the two main advantages they provide (i.e. high da...
Sergey Loyka, George Levin
ICDE
2007
IEEE
161views Database» more  ICDE 2007»
15 years 11 months ago
How to scalably and accurately skip past streams
Data stream methods look at each new item of the stream, perform a small number of operations while keeping a small amount of memory, and still perform muchneeded analyses. Howeve...
Supratik Bhattacharyya, André Madeira, S. M...
169
Voted
ICTAI
2007
IEEE
15 years 11 months ago
Establishing Logical Rules from Empirical Data
We review a method of generating logical rules, or axioms, from empirical data. This method, using closed set properties of formal concept analysis, has been previously described ...
John L. Pfaltz
ATAL
2007
Springer
15 years 10 months ago
A complete distributed constraint optimization method for non-traditional pseudotree arrangements
Distributed Constraint Optimization (DCOP) is a general framework that can model complex problems in multi-agent systems. Several current algorithms that solve general DCOP instan...
James Atlas, Keith Decker
« Prev « First page 2371 / 2528 Last » Next »