Sciweavers

3555 search results - page 649 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
117
Voted
WIKIS
2006
ACM
15 years 7 months ago
WikiTrails: augmenting Wiki structure for collaborative, interdisciplinary learning
Wikis are currently in high demand in a large variety of fields, due to their simplicity and flexible nature. Documentation, reporting, project management, online glossaries and d...
Silvan Reinhold
SC
2003
ACM
15 years 6 months ago
Remote Visualization by Browsing Image Based Databases with Logistical Networking
The need to provide remote visualization of large datasets with adequate levels of quality and interactivity has become a major impediment to distributed collaboration in Computat...
Jin Ding, Jian Huang, Micah Beck, Shaotao Liu, Ter...
KDD
2000
ACM
115views Data Mining» more  KDD 2000»
15 years 5 months ago
A framework for specifying explicit bias for revision of approximate information extraction rules
Information extraction is one of the most important techniques used in Text Mining. One of the main problems in building information extraction (IE) systems is that the knowledge ...
Ronen Feldman, Yair Liberzon, Binyamin Rosenfeld, ...
CADE
2001
Springer
16 years 1 months ago
More On Implicit Syntax
Proof assistants based on type theories, such as Coq and Lego, allow users to omit subterms on input that can be inferred automatically. While those mechanisms are well known, ad-h...
Marko Luther
CSEE
2000
Springer
15 years 5 months ago
Technology Transfer Issues for Formal Methods of Software Specification
Accurate and complete requirements specifications are crucial for the design and implementation of high-quality software. Unfortunately, the articulation and verification of softw...
Ken Abernethy, John C. Kelly, Ann E. Kelley Sobel,...