Sciweavers

977 search results - page 163 / 196
» Soft Constraints for Security
Sort
View
ICC
2007
IEEE
170views Communications» more  ICC 2007»
15 years 4 months ago
Evaluating Techniques for Network Layer Independence in Cognitive Networks
— Cognitive networks are the latest progression of cognitive functionality into the networking stack, an effort which began with a layer one and two focus on cognitive radios, an...
Muthukumaran Pitchaimani, Benjamin J. Ewy, Joseph ...
ICDE
2007
IEEE
123views Database» more  ICDE 2007»
15 years 4 months ago
Privacy Preserving Pattern Discovery in Distributed Time Series
The search for unknown frequent pattern is one of the core activities in many time series data mining processes. In this paper we present an extension of the pattern discovery pro...
Josenildo Costa da Silva, Matthias Klusch
OOPSLA
2007
Springer
15 years 4 months ago
Dependent classes
Dependent Classes Vaidas Gasiunas and Mira Mezini Technische Universit¨at Darmstadt, Germany Abstract. Dependent classes are parameterized classes, the interface and implementatio...
Vaidas Gasiunas, Mira Mezini, Klaus Ostermann
HICSS
2005
IEEE
223views Biometrics» more  HICSS 2005»
15 years 3 months ago
Intelligent Agent Supported Business Process Management
The complex business environment requires managing business processes with the ability to adapt to changes and to collaborate in activities. Conventional workflow approaches based...
Minhong Wang, Huaiqing Wang
OOPSLA
2005
Springer
15 years 3 months ago
SelfSync: a dynamic round-trip engineering environment
Model-Driven Engineering (MDE) advocates the generation of software applications from models, which are views on certain aspects of the software. In order to minimize the delta bet...
Ellen Van Paesschen, Wolfgang De Meuter, Maja D'Ho...