Sciweavers

9511 search results - page 1799 / 1903
» Selected Design Issues
Sort
View
150
Voted
JUCS
2008
115views more  JUCS 2008»
15 years 5 months ago
Capturing Interaction Requirements in a Model Transformation Technology Based on MDA
: Currently, many models are used to capture functional software requirements. However, the Software Engineering community has faded interaction requirements into the background, d...
José Ignacio Panach, Sergio España, ...
170
Voted
JUCS
2008
162views more  JUCS 2008»
15 years 5 months ago
Composition and Run-time Adaptation of Mismatching Behavioural Interfaces
Abstract: Reuse of software entities such as components or Web services raise composition issues since, most of the time, they present mismatches in their interfaces. These mismatc...
Javier Cámara, Gwen Salaün, Carlos Can...
144
Voted
JUCS
2008
113views more  JUCS 2008»
15 years 5 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
148
Voted
JUCS
2008
143views more  JUCS 2008»
15 years 5 months ago
Market Microstructure Patterns Powering Trading and Surveillance Agents
: Market Surveillance plays important mechanism roles in constructing market models. From data analysis perspective, we view it valuable for smart trading in designing legal and pr...
Longbing Cao, Yuming Ou
172
Voted
KAIS
2008
150views more  KAIS 2008»
15 years 5 months ago
A survey on algorithms for mining frequent itemsets over data streams
The increasing prominence of data streams arising in a wide range of advanced applications such as fraud detection and trend learning has led to the study of online mining of freq...
James Cheng, Yiping Ke, Wilfred Ng
« Prev « First page 1799 / 1903 Last » Next »