Sciweavers

3555 search results - page 538 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
IPSN
2010
Springer
15 years 11 months ago
Consensus-based distributed linear support vector machines
This paper develops algorithms to train linear support vector machines (SVMs) when training data are distributed across different nodes and their communication to a centralized no...
Pedro A. Forero, Alfonso Cano, Georgios B. Giannak...
COMPSAC
2003
IEEE
15 years 9 months ago
Just What Could Possibly Go Wrong In B2B Integration?
One important trend in enterprise-scale IT has been the increasing use of business-to-business integration (B2Bi) technologies to automate business processes that cross organisati...
Dean Kuo, Alan Fekete, Paul Greenfield, Julian Jan...
GI
2007
Springer
15 years 10 months ago
Semantic Web Technologies for Power Grid Management
: Utility companies worldwide are facing a multitude of new challenges, which can not be met with the historically grown, monolithic IT systems currently in use. Service oriented a...
Mathias Uslar, Nikolai Dahlem
WWW
2010
ACM
15 years 9 months ago
FormSys: form-processing web services
In this paper we present FormSys, a Web-based system that service-enables form documents. It offers two main services: filling in forms based on Web services’ incoming SOAP me...
Ingo M. Weber, Hye-Young Paik, Boualem Benatallah,...
AOSD
2006
ACM
15 years 10 months ago
Presenting crosscutting structure with active models
When modifying or debugging a software system, among other tasks, developers must often understand and manipulate source code that crosscuts the system’s structure. These tasks ...
Wesley Coelho, Gail C. Murphy