Sciweavers

1413 search results - page 174 / 283
» Design Patterns Application in UML
Sort
View
SIGSOFT
2005
ACM
14 years 11 months ago
Reasoning about confidentiality at requirements engineering time
Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Renaud De Landtsheer, Axel van Lamsweerde
SAGA
2001
Springer
14 years 2 months ago
Stochastic Finite Learning
Inductive inference can be considered as one of the fundamental paradigms of algorithmic learning theory. We survey results recently obtained and show their impact to potential ap...
Thomas Zeugmann
KDD
2001
ACM
231views Data Mining» more  KDD 2001»
14 years 10 months ago
A Framework for Efficient and Anonymous Web Usage Mining Based on Client-Side Tracking
Web Usage Mining (WUM), a natural application of data mining techniques to the data collected from user interactions with the web, has greatly concerned both academia and industry ...
Cyrus Shahabi, Farnoush Banaei Kashani
SIGMETRICS
1999
ACM
120views Hardware» more  SIGMETRICS 1999»
14 years 2 months ago
A Performance Study of Dynamic Replication Techniques in Continuous Media Servers
Multimedia applications are emerging in education, information dissemination, entertainment, as well as many other applications. The stringent requirements of such applications ma...
Cheng-Fu Chou, Leana Golubchik, John C. S. Lui
ISPASS
2009
IEEE
14 years 5 months ago
Lonestar: A suite of parallel irregular programs
Until recently, parallel programming has largely focused on the exploitation of data-parallelism in dense matrix programs. However, many important application domains, including m...
Milind Kulkarni, Martin Burtscher, Calin Cascaval,...