Sciweavers

3555 search results - page 561 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
145
Voted
APCCM
2009
15 years 5 months ago
Extracting Conceptual Graphs from Japanese Documents for Software Requirements Modeling
A requirements analysis step plays a significant role on the development of information systems, and in this step we various kinds of abstract models of the systems (called requir...
Ryo Hasegawa, Motohiro Kitamura, Haruhiko Kaiya, M...
ICDE
2009
IEEE
140views Database» more  ICDE 2009»
16 years 5 months ago
Predicting Multiple Metrics for Queries: Better Decisions Enabled by Machine Learning
One of the most challenging aspects of managing a very large data warehouse is identifying how queries will behave before they start executing. Yet knowing their performance charac...
Archana Ganapathi, Harumi A. Kuno, Umeshwar Dayal,...
DAGSTUHL
2007
15 years 5 months ago
Normtypologies
In this extended abstract I describe some norm typolgies developed within sociololgy and social philosophy. Using these typologies we can determine the bounderies of the different...
Harko Verhagen
WWW
2006
ACM
16 years 4 months ago
Knowledge modeling and its application in life sciences: a tale of two ontologies
High throughput glycoproteomics, similar to genomics and proteomics, involves extremely large volumes of distributed, heterogeneous data as a basis for identification and quantifi...
Satya Sanket Sahoo, Christopher Thomas, Amit P. Sh...
CSREAPSC
2006
15 years 5 months ago
Design and Implementation of SONICA (Service Oriented Network Interoperability for Component Adaptation) for Multimedia Pervasiv
Abstract - Recent advances in multimedia network systems have led to the development of a new generation of applications that associate the use of various multimedia objects. The c...
Hiroshi Hayakawa, Takahiro Koita, Kenya Sato