Sciweavers

1413 search results - page 174 / 283
» Design Patterns Application in UML
Sort
View
133
Voted
SIGSOFT
2005
ACM
16 years 3 months ago
Reasoning about confidentiality at requirements engineering time
Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Renaud De Landtsheer, Axel van Lamsweerde
122
Voted
SAGA
2001
Springer
15 years 7 months ago
Stochastic Finite Learning
Inductive inference can be considered as one of the fundamental paradigms of algorithmic learning theory. We survey results recently obtained and show their impact to potential ap...
Thomas Zeugmann
141
Voted
KDD
2001
ACM
231views Data Mining» more  KDD 2001»
16 years 3 months ago
A Framework for Efficient and Anonymous Web Usage Mining Based on Client-Side Tracking
Web Usage Mining (WUM), a natural application of data mining techniques to the data collected from user interactions with the web, has greatly concerned both academia and industry ...
Cyrus Shahabi, Farnoush Banaei Kashani
120
Voted
SIGMETRICS
1999
ACM
120views Hardware» more  SIGMETRICS 1999»
15 years 7 months ago
A Performance Study of Dynamic Replication Techniques in Continuous Media Servers
Multimedia applications are emerging in education, information dissemination, entertainment, as well as many other applications. The stringent requirements of such applications ma...
Cheng-Fu Chou, Leana Golubchik, John C. S. Lui
134
Voted
ISPASS
2009
IEEE
15 years 9 months ago
Lonestar: A suite of parallel irregular programs
Until recently, parallel programming has largely focused on the exploitation of data-parallelism in dense matrix programs. However, many important application domains, including m...
Milind Kulkarni, Martin Burtscher, Calin Cascaval,...