Sciweavers

1138 search results - page 199 / 228
» First-Order Model Checking Problems Parameterized by the Mod...
Sort
View
LICS
1999
IEEE
13 years 12 months ago
Proving Security Protocols Correct
Security protocols use cryptography to set up private communication channels on an insecure network. Many protocols contain flaws, and because security goals are seldom specified ...
Lawrence C. Paulson
PKDD
1999
Springer
272views Data Mining» more  PKDD 1999»
13 years 12 months ago
Handling Missing Data in Trees: Surrogate Splits or Statistical Imputation
Abstract. In many applications of data mining a - sometimes considerable - part of the data values is missing. This may occur because the data values were simply never entered into...
A. J. Feelders
CSCW
1998
ACM
13 years 12 months ago
Using Filtering Agents to Improve Prediction Quality in the GroupLens Research Collaborative Filtering System
Collaborative filtering systems help address information overload by using the opinions of users in a community to make personal recommendations for documents to each user. Many c...
Badrul M. Sarwar, Joseph A. Konstan, Al Borchers, ...
EDOC
2004
IEEE
13 years 11 months ago
A Framework for Integrating Business Processes and Business Requirements
Service-oriented architectures and Web service infrastructure provide the ideal framework for interconnecting organizations and for defining distributed business applications. The...
Raman Kazhamiakin, Marco Pistore, Marco Roveri
EMSOFT
2006
Springer
13 years 11 months ago
Software partitioning for effective automated unit testing
A key problem for effective unit testing is the difficulty of partitioning large software systems into appropriate units that can be tested in isolation. We present an approach th...
Arindam Chakrabarti, Patrice Godefroid