Sciweavers

4911 search results - page 510 / 983
» Tree dependence analysis
Sort
View
ICSE
2004
IEEE-ACM
16 years 5 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde
SSDBM
2006
IEEE
140views Database» more  SSDBM 2006»
15 years 11 months ago
A Dynamic Mobility Histogram Construction Method Based on Markov Chains
With the recent progress of spatial information technologies and communication technologies, it has become easier to track positions of a large number of moving objects in real-ti...
Yoshiharu Ishikawa, Yoji Machida, Hiroyuki Kitagaw...
DRR
2010
15 years 7 months ago
Efficient automatic OCR word validation using word partial format derivation and language model
In this paper we present an OCR validation module, implemented for the System for Preservation of Electronic Resources (SPER) developed at the U.S. National Library of Medicine.1 ...
Siyuan Chen, Dharitri Misra, George R. Thoma
IDA
2010
Springer
15 years 6 months ago
A Framework for Path-Oriented Network Simplification
Abstract. We propose a generic framework and methods for simplification of large networks. The methods can be used to improve the understandability of a given network, to complemen...
Hannu Toivonen, Sébastien Mahler, Fang Zhou
ASIAMS
2009
IEEE
15 years 6 months ago
Uncovering Hidden Information Within University's Student Enrollment Data Using Data Mining
To date, higher educational organizations are placed in a very high competitive environment. To remain competitive, one approach is to tackle the student and administration challen...
Fadzilah Siraj, Mansour Ali Abdoulha