Sciweavers

8468 search results - page 1481 / 1694
» The Technology of Data Stashing
Sort
View
77
Voted
INFSOF
2006
102views more  INFSOF 2006»
14 years 11 months ago
Comparison of software architecture reverse engineering methods
Problems related to interactions between components is a sign of problems with the software architecture of the system and are often costly to fix. Thus it is very desirable to id...
Catherine Stringfellow, C. D. Amory, Dileep Potnur...
94
Voted
CSI
2007
86views more  CSI 2007»
14 years 11 months ago
Using UML to model relational database operations
The Unified Modeling Language (UML) is being used as the de-facto standard in the software industry. With the adoption of UML 2.0, the new enhancements allow this version to desc...
Eunjee Song, Shuxin Yin, Indrakshi Ray
74
Voted
JSW
2008
101views more  JSW 2008»
14 years 11 months ago
Implicit Authorization for Social Location Disclosure
Being increasingly equipped with highly-accurate positioning technologies, today's mobile phones enable their owners to transmit their current position over the cellular netwo...
Georg Treu, Florian Fuchs, Christiane Dargatz
87
Voted
JFR
2006
109views more  JFR 2006»
14 years 11 months ago
Alice: An information-rich autonomous vehicle for high-speed desert navigation
This paper describes the implementation and testing of Alice, the California Institute of Technology's entry in the 2005 DARPA Grand Challenge. Alice utilizes a highly networ...
Lars B. Cremean, Tully B. Foote, Jeremy H. Gillula...
76
Voted
KBS
2008
198views more  KBS 2008»
14 years 11 months ago
Clinical practice guidelines: A case study of combining OWL-S, OWL, and SWRL
As the number of available Web services increases there is a growing demand to realise complex business processes by combining and reusing available Web services. In this context,...
Mercedes Argüello Casteleiro, Jose Julio Des ...
« Prev « First page 1481 / 1694 Last » Next »