Sciweavers

3885 search results - page 643 / 777
» Transformations for Write-All-with-Collision Model
Sort
View
128
Voted
WWW
2005
ACM
16 years 4 months ago
Web services security configuration in a service-oriented architecture
Security is one of the major concerns when developing missioncritical business applications, and this concern motivated the Web Services Security specifications. However, the exis...
Takeshi Imamura, Michiaki Tatsubori, Yuichi Nakamu...
117
Voted
WWW
2004
ACM
16 years 4 months ago
HPG: a tool for presentation generation in WIS
Web Information Systems (WIS) support the process of retrieving information from sources on the Web and of presenting them as a hypermedia presentation. Most WIS design ogies focu...
Bas Rutten, Peter Barna, Flavius Frasincar, Geert-...
117
Voted
KDD
2008
ACM
135views Data Mining» more  KDD 2008»
16 years 3 months ago
Effective and efficient itemset pattern summarization: regression-based approaches
In this paper, we propose a set of novel regression-based approaches to effectively and efficiently summarize frequent itemset patterns. Specifically, we show that the problem of ...
Ruoming Jin, Muad Abu-Ata, Yang Xiang, Ning Ruan
VLSID
2002
IEEE
177views VLSI» more  VLSID 2002»
16 years 3 months ago
RTL-Datapath Verification using Integer Linear Programming
Satisfiability of complex word-level formulas often arises as a problem in formal verification of hardware designs described at the register transfer level (RTL). Even though most...
Raik Brinkmann, Rolf Drechsler
CHI
2002
ACM
16 years 3 months ago
Cognitive walkthrough for the web
This paper proposes a transformation of the Cognitive Walkthrough (CW), a theory-based usability inspection method that has proven useful in designing applications that support us...
Marilyn Hughes Blackmon, Peter G. Polson, Muneo Ki...