Sciweavers

337 search results - page 46 / 68
» Guiding the Application of Design Patterns Based on UML Mode...
Sort
View
ECTEL
2007
Springer
14 years 2 months ago
Role Based Access Control for the Interaction with Search Engines
Search engine-based features are a basic interaction mean for users to find information inside a Web-based Learning Management Systems (LMS); nonetheless, traditional solutions la...
Alessandro Bozzon, Tereza Iofciu, Wolfgang Nejdl, ...
KDD
2001
ACM
231views Data Mining» more  KDD 2001»
14 years 9 months ago
A Framework for Efficient and Anonymous Web Usage Mining Based on Client-Side Tracking
Web Usage Mining (WUM), a natural application of data mining techniques to the data collected from user interactions with the web, has greatly concerned both academia and industry ...
Cyrus Shahabi, Farnoush Banaei Kashani
ISBI
2007
IEEE
14 years 2 months ago
A Novel Tag Removal Technique for Tagged Cardiac Mri and Its Applications
In this paper we present a novel tag removal method for tagged cardiac MR images. This method is based on a 2D bandstop filtering technique, which selectively attenuates the tag ...
Zhen Qian, Rui Huang, Dimitris N. Metaxas, Leon Ax...
MOMPES
2008
IEEE
14 years 3 months ago
Architectural Concurrency Equivalence with Chaotic Models
During its lifetime, embedded systems go through multiple changes to their runtime architecture. That is, threads, processes, and processor are added or removed to/from the softwa...
Dionisio de Niz
IEEEARES
2006
IEEE
14 years 2 months ago
Modeling permissions in a (U/X)ML world
— Service Oriented Architectures with underlying technologies like web services and web services orchestration have opened the door to a wide range of novel application scenarios...
Muhammad Alam, Ruth Breu, Michael Hafner