Sciweavers

955 search results - page 151 / 191
» Coordination analysis: a method for deriving use cases from ...
Sort
View
ASWEC
2006
IEEE
14 years 1 months ago
Evaluating software refactoring tool support
Up to 75% of the costs associated with the development of software systems occur post-deployment during maintenance and evolution. Software refactoring is a process which can sign...
Erica Mealy, Paul A. Strooper
PE
2010
Springer
170views Optimization» more  PE 2010»
13 years 6 months ago
Approximating passage time distributions in queueing models by Bayesian expansion
We introduce Bayesian Expansion (BE), an approximate numerical technique for passage time distribution analysis in queueing networks. BE uses a class of Bayesian networks to appro...
Giuliano Casale
ICIAP
2005
ACM
14 years 8 months ago
Robust Face Recognition Based on Part-Based Localized Basis Images
In order for a subspace projection based method to be robust to local distortion and partial occlusion, the basis images generated by the method should exhibit a part-based local r...
Jongsun Kim, Juneho Yi
IJCV
1998
238views more  IJCV 1998»
13 years 7 months ago
Feature Detection with Automatic Scale Selection
The fact that objects in the world appear in different ways depending on the scale of observation has important implications if one aims at describing them. It shows that the not...
Tony Lindeberg
KDD
2009
ACM
196views Data Mining» more  KDD 2009»
14 years 2 months ago
WhereNext: a location predictor on trajectory pattern mining
The pervasiveness of mobile devices and location based services is leading to an increasing volume of mobility data. This side effect provides the opportunity for innovative meth...
Anna Monreale, Fabio Pinelli, Roberto Trasarti, Fo...