Sciweavers

990 search results - page 96 / 198
» A Static Analysis Technique for Graph Transformation Systems
Sort
View
ECML
2007
Springer
14 years 2 months ago
Using Text Mining and Link Analysis for Software Mining
Many data mining techniques are these days in use for ontology learning – text mining, Web mining, graph mining, link analysis, relational data mining, and so on. In the current ...
Miha Grcar, Marko Grobelnik, Dunja Mladenic
HICSS
2003
IEEE
167views Biometrics» more  HICSS 2003»
14 years 1 months ago
Discovering Group Interaction Patterns in a Teachers Professional Community
Managers and group leaders of a community may not have enough information to help them direct the community development. In this paper, we adopt social network analysis, graph the...
Fu-ren Lin, Chun-Hung Chen, Kuo-Lung Tsai
ICPR
2008
IEEE
14 years 9 months ago
Comparative analysis of registration based and registration free methods for cancelable fingerprint biometrics
Cancelable biometric systems are gaining in popularity for use in person authentication for applications where the privacy and security of biometric templates are important consid...
Achint Oommen Thomas, Nalini K. Ratha, Jonathan H....
CC
2006
Springer
122views System Software» more  CC 2006»
13 years 11 months ago
Context-Sensitive Points-to Analysis: Is It Worth It?
We present the results of an empirical study evaluating the precision of subset-based points-to analysis with several variations of context sensitivity on Java benchmarks of signif...
Ondrej Lhoták, Laurie J. Hendren
ADAEUROPE
2005
Springer
14 years 1 months ago
Non-intrusive System Level Fault-Tolerance
This paper describes the methodology used to add nonintrusive system-level fault tolerance to an electronic throttle controller. The original model of the throttle controller is a...
Kristina Lundqvist, Jayakanth Srinivasan, Sé...