Sciweavers

17789 search results - page 90 / 3558
» Exceptional Use Cases
Sort
View
AICT
2006
IEEE
109views Communications» more  AICT 2006»
14 years 1 months ago
mTag - Architecture for Discovering Location Specific Mobile Web Services Using RFID and Its Evaluation with Two Case Studies
This paper introduces mTag, a distributed eventdriven architecture for discovering location specific mobile web services. Service discovery is initiated by touching a fixed RFID r...
Jani Korhonen, Timo Ojala, Mikko Klemola, Pasi Vaa...
WCRE
2006
IEEE
14 years 1 months ago
Monitoring Requirements Coverage using Reconstructed Views: An Industrial Case Study
Requirements views, such as coverage and status views, are an important asset for monitoring and managing software development. We have developed a method that automates the proce...
Marco Lormans, Hans-Gerhard Groß, Arie van D...
ACSAC
1999
IEEE
14 years 4 days ago
Using Abuse Case Models for Security Requirements Analysis
The relationships between the work products of a security engineering process can be hard to understand, even for persons with a strong technical background but little knowledge o...
John P. McDermott, Chris Fox
AWIC
2003
Springer
14 years 1 months ago
Using Case-Based Reasoning to Improve Information Retrieval in Knowledge Management Systems
Abstract. Complementary to hypertext navigation, classic information retrieval is broadly used to find information on the World Wide Web and on Web-based systems. Among these there...
Norbert Gronau, Frank Laskowski
JMLR
2011
137views more  JMLR 2011»
13 years 2 months ago
Online Learning in Case of Unbounded Losses Using Follow the Perturbed Leader Algorithm
In this paper the sequential prediction problem with expert advice is considered for the case where losses of experts suffered at each step cannot be bounded in advance. We presen...
Vladimir V. V'yugin