Sciweavers

6253 search results - page 1036 / 1251
» Use Case Modeling Guidelines
Sort
View
KDD
2001
ACM
211views Data Mining» more  KDD 2001»
16 years 4 months ago
Magical thinking in data mining: lessons from CoIL challenge 2000
CoIL challenge 2000 was a supervised learning contest that attracted 43 entries. The authors of 29 entries later wrote explanations of their work. This paper discusses these repor...
Charles Elkan
CCS
2009
ACM
15 years 11 months ago
Computational soundness for key exchange protocols with symmetric encryption
Formal analysis of security protocols based on symbolic models has been very successful in finding flaws in published protocols and proving protocols secure, using automated too...
Ralf Küsters, Max Tuengerthal
P2P
2009
IEEE
126views Communications» more  P2P 2009»
15 years 10 months ago
Robust Lifetime Measurement in Large-Scale P2P Systems with Non-Stationary Arrivals
—Characterizing user churn has become an important topic in studying P2P networks, both in theoretical analysis and system design. Recent work [26] has shown that direct sampling...
Xiaoming Wang, Zhongmei Yao, Yueping Zhang, Dmitri...
ICSR
2009
Springer
15 years 10 months ago
Reuse of Architectural Knowledge in SPL Development
Abstract. Software Product Lines (SPL) promote reuse within an application domain in an organized fashion. Preimplemented software components are arranged according to a product li...
Pedro O. Rossel, Daniel Perovich, M. Cecilia Basta...
ISMAR
2007
IEEE
15 years 10 months ago
Real-Time Object Tracking for Augmented Reality Combining Graph Cuts and Optical Flow
We present an efficient and accurate object tracking algorithm based on the concept of graph cut segmentation. The ability to track visible objects in real-time provides an inval...
Jonathan Mooser, Suya You, Ulrich Neumann
« Prev « First page 1036 / 1251 Last » Next »