Sciweavers

7886 search results - page 54 / 1578
» An evaluation of bipartitioning techniques
Sort
View
ICALP
2011
Springer
13 years 20 days ago
On Tree-Constrained Matchings and Generalizations
We consider the following Tree-Constrained Bipartite Matching problem: Given two rooted trees T1 = (V1, E1), T2 = (V2, E2) and a weight function w : V1 × V2 → R+, find a maximu...
Stefan Canzar, Khaled M. Elbassioni, Gunnar W. Kla...
SEC
2001
13 years 10 months ago
Extended Description Techniques for Security Engineering
There is a strong demand for techniques to aid development and modelling of security critical systems. Based on general security evaluation criteria, we show how to extend the syst...
Guido Wimmel, Alexander K. Wißpeintner
KI
2002
Springer
13 years 8 months ago
Advantages, Opportunities and Limits of Empirical Evaluations: Evaluating Adaptive Systems
While empirical evaluations are a common research method in some areas of Artificial Intelligence (AI), others still neglect this approach. This article outlines both the opportun...
Stephan Weibelzahl, Gerhard Weber
WWW
2007
ACM
14 years 10 months ago
An assessment of tag presentation techniques
With the growth of social bookmarking a new approach for metadata creation called tagging has emerged. In this paper we evaluate the use of tag presentation techniques. The main g...
Martin Halvey, Mark T. Keane
WCRE
1999
IEEE
14 years 1 months ago
A Framework for Classifying and Comparing Software Reverse Engineering and Design Recovery Techniques
Several techniques have been suggested for supporting reverse engineering and design recovery activities. While many of these techniques have been cataloged in various collections...
Gerald C. Gannod, Betty H. C. Cheng