Sciweavers

2024 search results - page 260 / 405
» Improving quality, one process change at a time
Sort
View
DEXAW
1999
IEEE
129views Database» more  DEXAW 1999»
14 years 1 months ago
The Challenges of Requirements Engineering in Mobile Telephones Industry
Requirements engineering ranks as one of the most difficult and error-prone phases in the life cycle of devices such as mobile telephones. It is of critical importance because of ...
Alessandro Maccari
JCP
2008
145views more  JCP 2008»
13 years 9 months ago
An Effective Mining Algorithm for Weighted Association Rules in Communication Networks
The mining of weighted association rules is one of the primary methods used in communication alarm correlation analysis. With large communication alarm database, the traditional me...
Jian Wu, Xing ming Li
RECOMB
2006
Springer
14 years 9 months ago
RNA Secondary Structure Prediction Via Energy Density Minimization
Abstract. There is a resurgence of interest in RNA secondary structure prediction problem (a.k.a. the RNA folding problem) due to the discovery of many new families of non-coding R...
Can Alkan, Emre Karakoç, Süleyman Cenk...
GG
2004
Springer
14 years 2 months ago
Extending Graph Rewriting for Refactoring
Refactorings are transformations that change the structure of a program, while preserving the behavior. The topic has attracted a lot of attention recently, since it is a promising...
Niels Van Eetvelde, Dirk Janssens
ICDE
2008
IEEE
498views Database» more  ICDE 2008»
15 years 9 months ago
Injector: Mining Background Knowledge for Data Anonymization
Existing work on privacy-preserving data publishing cannot satisfactorily prevent an adversary with background knowledge from learning important sensitive information. The main cha...
Tiancheng Li, Ninghui Li