Sciweavers

6598 search results - page 1204 / 1320
» Graph Theory with Applications
Sort
View
ATAL
2003
Springer
15 years 9 months ago
Customizing AOSE methodologies by reusing AOSE features
Future large-scale software development projects will require engineering support for a diverse range of software quality attributes, such as privacy and openness. It is not feasi...
Thomas Juan, Leon Sterling, Maurizio Martelli, Viv...
PLDI
2010
ACM
15 years 9 months ago
Mint: Java multi-stage programming using weak separability
Multi-stage programming (MSP) provides a disciplined approach to run-time code generation. In the purely functional setting, it has been shown how MSP can be used to reduce the ov...
Edwin Westbrook, Mathias Ricken, Jun Inoue, Yilong...
SIGMOD
2010
ACM
153views Database» more  SIGMOD 2010»
15 years 9 months ago
Threshold query optimization for uncertain data
The probabilistic threshold query (PTQ) is one of the most common queries in uncertain databases, where all results satisfying the query with probabilities that meet the threshold...
Yinian Qi, Rohit Jain, Sarvjeet Singh, Sunil Prabh...
SACMAT
2009
ACM
15 years 9 months ago
A formal framework to elicit roles with business meaning in RBAC systems
The role-based access control (RBAC) model has proven to be cost effective to reduce the complexity and costs of access permission management. To maximize the advantages offered...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
SAGA
2001
Springer
15 years 9 months ago
Stochastic Finite Learning
Inductive inference can be considered as one of the fundamental paradigms of algorithmic learning theory. We survey results recently obtained and show their impact to potential ap...
Thomas Zeugmann
« Prev « First page 1204 / 1320 Last » Next »