Sciweavers

199 search results - page 16 / 40
» End User Programming for Scientists: Modeling Complex System...
Sort
View
IWSEC
2009
Springer
14 years 3 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
CONSTRAINTS
2004
116views more  CONSTRAINTS 2004»
13 years 8 months ago
Decision Tradeoff Using Example-Critiquing and Constraint Programming
We consider constructive preference elicitation for decision aid systems in applications such as configuration or electronic catalogs. We are particularly interested in supporting ...
Pearl Pu, Boi Faltings
IPPS
2010
IEEE
13 years 6 months ago
PreDatA - preparatory data analytics on peta-scale machines
Peta-scale scientific applications running on High End Computing (HEC) platforms can generate large volumes of data. For high performance storage and in order to be useful to scien...
Fang Zheng, Hasan Abbasi, Ciprian Docan, Jay F. Lo...
CIIT
2004
127views Communications» more  CIIT 2004»
13 years 10 months ago
OLSIM: Up-to-date traffic information on the web
The Internet is a convenient platform to distribute real time traffic information. Thus, we propose a web-based visualization of the current and future traffic load of the entire ...
Andreas Pottmeier, Roland Chrobok, Sigurdur F. Haf...
EDBT
2010
ACM
145views Database» more  EDBT 2010»
13 years 12 months ago
Splash: ad-hoc querying of data and statistical models
Data mining is increasingly performed by people who are not computer scientists or professional programmers. It is often done as an iterative process involving multiple ad-hoc tas...
Lujun Fang, Kristen LeFevre