Sciweavers

1573 search results - page 230 / 315
» Signs and Formal Concepts
Sort
View
ECOOP
2009
Springer
16 years 2 months ago
From Public to Private to Absent: Refactoring Java Programs under Constrained Accessibility
Contemporary refactoring tools for JAVA aiding in the restructuring of programs have problems with respecting access modifiers such as public and private: while some tools provide ...
Friedrich Steimann, Andreas Thies
CHES
2009
Springer
140views Cryptology» more  CHES 2009»
16 years 2 months ago
On Tamper-Resistance from a Theoretical Viewpoint
Tamper-proof devices are pretty powerful. They can be used to have better security in applications. In this work we observe that they can also be maliciously used in order to defea...
Paulo Mateus, Serge Vaudenay
KDD
2006
ACM
136views Data Mining» more  KDD 2006»
16 years 2 months ago
Mining quantitative correlated patterns using an information-theoretic approach
Existing research on mining quantitative databases mainly focuses on mining associations. However, mining associations is too expensive to be practical in many cases. In this pape...
Yiping Ke, James Cheng, Wilfred Ng
KDD
2004
ACM
314views Data Mining» more  KDD 2004»
16 years 2 months ago
Assessment of discretization techniques for relevant pattern discovery from gene expression data
In the domain of gene expression data analysis, various researchers have recently emphasized the promising application of pattern discovery techniques like association rule mining...
Ruggero G. Pensa, Claire Leschi, Jéré...
CHI
2004
ACM
16 years 2 months ago
One-hundred days in an activity-centric collaboration environment based on shared objects
This paper describes a new collaboration technology that is carefully poised between informal, ad hoc, easy-to-initiate collaborative tools, vs. more formal, structured, and higho...
Michael J. Muller, Werner Geyer, Beth Brownholtz, ...