Sciweavers

1187 search results - page 59 / 238
» Extensible Requirements Patterns of Web Application for Effi...
Sort
View
IS
2010
13 years 7 months ago
Tree pattern mining with tree automata constraints
Most work on pattern mining focuses on simple data structures such as itemsets and sequences of itemsets. However, a lot of recent applications dealing with complex data like chem...
Sandra de Amo, Nyara A. Silva, Ronaldo P. Silva, F...
ICWE
2007
Springer
14 years 2 months ago
Metamodeling the Quality of the Web Development Process' Intermediate Artifacts
WE practices lack an impact on industry, partly due to a WE field that is not quality-aware. In fact, it is difficult to find WE methodologies that pay explicit attention to qualit...
Cristina Cachero, Coral Calero, Geert Poels
CORR
2012
Springer
237views Education» more  CORR 2012»
12 years 4 months ago
Novel Component Based Development Model For Sip-Based Mobile Application
Universities and Institutions these days’ deals with issues related to with assessment of large number of students. Various evaluation methods have been adopted by examiners in ...
Ahmed Barnawi, Abdurrahman H. Al-Talhi, M. Rizwan ...
ICDE
2004
IEEE
115views Database» more  ICDE 2004»
14 years 10 months ago
Unordered Tree Mining with Applications to Phylogeny
Frequent structure mining (FSM) aims to discover and extract patterns frequently occurring in structural data, such as trees and graphs. FSM finds many applications in bioinformat...
Dennis Shasha, Jason Tsong-Li Wang, Sen Zhang
ICML
2009
IEEE
14 years 9 months ago
Identifying suspicious URLs: an application of large-scale online learning
This paper explores online learning approaches for detecting malicious Web sites (those involved in criminal scams) using lexical and host-based features of the associated URLs. W...
Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffr...