Sciweavers

2562 search results - page 454 / 513
» The Use of B2B Process Standards: A Case Study
Sort
View
TIP
1998
103views more  TIP 1998»
14 years 9 months ago
Orientation diffusions
Abstract—Diffusions are useful for image processing and computer vision because they provide a convenient way of smoothing noisy data, analyzing images at multiple scales, and en...
Pietro Perona
TCS
2002
14 years 9 months ago
Binary (generalized) Post Correspondence Problem
An instance of the (Generalized) Post Correspondence Problem is during the decision process typically reduced to one or more other instances, called its successors. In this paper ...
Vesa Halava, Tero Harju, Mika Hirvensalo
TSE
2002
99views more  TSE 2002»
14 years 9 months ago
Recovering Traceability Links between Code and Documentation
Software system documentation is almost always expressed informally in natural language and free text. Examples include requirement specifications, design documents, manual pages, ...
Giuliano Antoniol, Gerardo Canfora, Gerardo Casazz...
IEEECIT
2010
IEEE
14 years 8 months ago
Model-Level Debugging of Embedded Real-Time Systems
Abstract—Model-driven development has become the stateof-the-art approach for designing embedded real-time systems. heir high level of abstraction, models are easier to understan...
Wolfgang Haberl, Markus Herrmannsdoerfer, Jan Birk...
SACMAT
2010
ACM
14 years 8 months ago
Role mining based on weights
Role mining from the existing permissions has been widely applied to aid the process of migrating to an RBAC system. While all permissions are treated evenly in previous approache...
Xiaopu Ma, Ruixuan Li, Zhengding Lu