Sciweavers

3555 search results - page 99 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
ECIS
2003
15 years 2 months ago
User involvement in development of web based publishing
The theme of this paper is development of Web applications used by an organization to publish information to groups of users outside the organization. The paper focus on the chall...
Lasse Vogelsang
99
Voted
AI
2003
Springer
15 years 6 months ago
Case Authoring from Text and Historical Experiences
The problem of repair and maintenance of complex systems, such as aircraft, cars and trucks is certainly a nontrivial task. Maintenance technicians must use a great amount of knowl...
Marvin Zaluski, Nathalie Japkowicz, Stan Matwin
ADAPTIVE
2007
Springer
15 years 7 months ago
Case-Based Recommendation
Abstract. Data Mining, or Knowledge Discovery as it is also known, is becoming increasingly useful in a wide variety of applications. In the following paper, we look at its use in ...
Barry Smyth
GG
2008
Springer
15 years 2 months ago
Model-Driven Development of Model Transformations
The model-driven development of model transformations requires both a technique to model model transformations as well as a means to transform transformation models. Therefore, t...
Pieter Van Gorp
ERSA
2006
186views Hardware» more  ERSA 2006»
15 years 2 months ago
The Case for High Level Programming Models for Reconfigurable Computers
In this paper we first outline and discuss the issues of currently accepted computational models for hybrid CPU/FPGA systems. Then, we discuss the need for researchers to develop ...
David L. Andrews, Ron Sass, Erik Anderson, Jason A...