Sciweavers

942 search results - page 152 / 189
» From System Comprehension to Program Comprehension
Sort
View
ALGORITHMICA
2002
120views more  ALGORITHMICA 2002»
13 years 10 months ago
An Experimental Study of Algorithms for Weighted Completion Time Scheduling
We consider the total weighted completion time scheduling problem for parallel identical machines and precedence constraints, P jprecj PwiCi. This important and broad class of pro...
Ivan D. Baev, Waleed Meleis, Alexandre E. Eichenbe...
IFIP
2001
Springer
14 years 2 months ago
Security Documentation
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Lam-for Kwok, Peggy P. K. Fung, Dennis Longley
WIDM
2003
ACM
14 years 3 months ago
Conceptual modeling of semantic navigation structures: the MoSeNa-approach
At the present time, several shortcomings prevent the more effective use and more intense application of web information systems. Recent developments that are subsumed by the term...
Jörg Becker, Christian Brelage, Karsten Klose...
WWW
2011
ACM
13 years 5 months ago
A case for query by image and text content: searching computer help using screenshots and keywords
The multimedia information retrieval community has dedicated extensive research effort to the problem of content-based image retrieval (CBIR). However, these systems find their ma...
Tom Yeh, Brandyn White, Jose San Pedro, Boris Katz...
CCS
2011
ACM
12 years 10 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...