Sciweavers

294 search results - page 37 / 59
» Conflict Analysis for Management Policies
Sort
View
CIKM
2009
Springer
13 years 11 months ago
Blog cascade affinity: analysis and prediction
Information propagation within the blogosphere is of much importance in implementing policies, marketing research, launching new products, and other applications. In this paper, w...
Hui Li, Sourav S. Bhowmick, Aixin Sun
DIM
2007
ACM
13 years 11 months ago
Linkability estimation between subjects and message contents using formal concepts
In this paper, we examine how conclusions about linkability threats can be drawn by analyzing message contents and subject knowledge in arbitrary communication systems. At first, ...
Stefan Berthold, Sebastian Clauß
ICDE
2005
IEEE
131views Database» more  ICDE 2005»
14 years 9 months ago
Improving Preemptive Prioritization via Statistical Characterization of OLTP Locking
OLTP and transactional workloads are increasingly common in computer systems, ranging from ecommerce to warehousing to inventory management. It is valuable to provide priority sch...
David T. McWherter, Bianca Schroeder, Anastassia A...
SIGSOFT
2008
ACM
14 years 8 months ago
Requirements engineering: from craft to discipline
Getting the right software requirements under the right environment assumptions is a critical precondition for developing the right software. This task is intrinsically difficult....
Axel van Lamsweerde
DATE
2009
IEEE
119views Hardware» more  DATE 2009»
13 years 11 months ago
Predictive models for multimedia applications power consumption based on use-case and OS level analysis
—Power management at any abstraction level is a key issue for many mobile multimedia and embedded applications. In this paper a design workflow to generate system-level power mo...
Patrick Bellasi, William Fornaciari, David Siorpae...