Sciweavers

462 search results - page 77 / 93
» Impact Analysis and Change Management of UML Models
Sort
View
ISM
2005
IEEE
159views Multimedia» more  ISM 2005»
14 years 2 months ago
Avatar-centric Risk Evaluation
Hazard detection and prevention of natural and manmade disasters at critical civil infrastructure is becoming increasingly important. Recent events, such as earthquakes and terror...
Maria-Cruz Villa-Uriol, Falko Kuester, Oscar Garc&...
CGF
2010
106views more  CGF 2010»
13 years 8 months ago
Alleviating the Modifiable Areal Unit Problem within Probe-Based Geospatial Analyses
We present a probe-based interface for the exploration of the results of a geospatial simulation of urban growth. Because our interface allows the user great freedom in how they c...
Thomas Butkiewicz, Ross K. Meentemeyer, Douglas A....
AINA
2007
IEEE
14 years 3 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
CIKM
2006
Springer
14 years 11 days ago
Resource-aware kernel density estimators over streaming data
A fundamental building block of many data mining and analysis approaches is density estimation as it provides a comprehensive statistical model of a data distribution. For that re...
Christoph Heinz, Bernhard Seeger
CONEXT
2008
ACM
13 years 10 months ago
EGOIST: overlay routing using selfish neighbor selection
A foundational issue underlying many overlay network applications ranging from routing to peer-to-peer file sharing is that of connectivity management, i.e., folding new arrivals ...
Georgios Smaragdakis, Vassilis Lekakis, Nikolaos L...