Sciweavers

991 search results - page 186 / 199
» Analyzing URL queries
Sort
View
APSEC
2003
IEEE
14 years 1 months ago
Understanding How the Requirements Are Implemented in Source Code
For software maintenance and evolution, a common problem is to understand how each requirement is implemented in the source code. The basic solution of this problem is to find the...
Wei Zhao, Lu Zhang, Yin Liu, Jing Luo, Jiasu Sun
IRI
2003
IEEE
14 years 1 months ago
Damage Pattern Mining in Hurricane Image Databases
– We present a damage pattern mining framework for hurricane data on residential houses using aerial photographs with 1:3000 based scale. The vertical photographs are normally co...
Shu-Ching Chen, Mei-Ling Shyu, Chengcui Zhang, Wal...
ADC
2003
Springer
123views Database» more  ADC 2003»
14 years 1 months ago
A Distance-Based Packing Method for High Dimensional Data
Minkowski-sum cost model indicates that balanced data partitioning is not beneficial for high dimensional data. Thus we study several unbalanced partitioning methods and propose ...
Tae-wan Kim, Ki-Joune Li
ADC
2003
Springer
106views Database» more  ADC 2003»
14 years 1 months ago
Database Component Ware
Database modeling is still a job of an artisan. Due to this approach database schemata evolve by growth without any evolution plan. Finally, they cannot be examined, surveyed, con...
Bernhard Thalheim
CP
2003
Springer
14 years 1 months ago
Open Constraint Optimization
Constraint satisfaction has been applied with great success in closed-world scenarios, where all options and constraints are known from the beginning and fixed. With the internet,...
Boi Faltings, Santiago Macho-Gonzalez