Sciweavers

945 search results - page 160 / 189
» Detective Information Flow Analysis for Business Processes
Sort
View
ICST
2010
IEEE
13 years 6 months ago
Automated Test Data Generation on the Analyses of Feature Models: A Metamorphic Testing Approach
A Feature Model (FM) is a compact representation of all the products of a software product line. The automated extraction of information from FMs is a thriving research topic invo...
Sergio Segura, Robert M. Hierons, David Benavides,...
SIGMOD
2012
ACM
383views Database» more  SIGMOD 2012»
11 years 11 months ago
Dynamic workload driven data integration in tableau
Tableau is a commercial business intelligence (BI) software tool that supports interactive, visual analysis of data. Armed with a visual interface to data and a focus on usability...
Kristi Morton, Ross Bunker, Jock D. Mackinlay, Rob...
KDD
2009
ACM
169views Data Mining» more  KDD 2009»
14 years 3 months ago
On burstiness-aware search for document sequences
As the number and size of large timestamped collections (e.g. sequences of digitized newspapers, periodicals, blogs) increase, the problem of efficiently indexing and searching su...
Theodoros Lappas, Benjamin Arai, Manolis Platakis,...
HT
2009
ACM
14 years 3 months ago
Hyperincident connected components of tagging networks
Data created by social bookmarking systems can be described as 3-partite 3-uniform hypergraphs connecting documents, users, and tags (tagging networks), such that the toolbox of c...
Nicolas Neubauer, Klaus Obermayer
LPAR
2007
Springer
14 years 2 months ago
Verifying Cryptographic Protocols with Subterms Constraints
Many analysis techniques and decidability results have been obtained for cryptographic protocols. However all of them consider protocols with limited procedures for the processing ...
Yannick Chevalier, Denis Lugiez, Michaël Rusi...