Sciweavers

288 search results - page 19 / 58
» Managing iterations with UNICASE
Sort
View
CCS
2011
ACM
12 years 9 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
KDD
2012
ACM
194views Data Mining» more  KDD 2012»
12 years 6 days ago
A sparsity-inducing formulation for evolutionary co-clustering
Traditional co-clustering methods identify block structures from static data matrices. However, the data matrices in many applications are dynamic; that is, they evolve smoothly o...
Shuiwang Ji, Wenlu Zhang, Jun Liu
CHI
2006
ACM
14 years 10 months ago
Social visualization in software development
Most software development tools focus on supporting the primary technical work ? writing code, managing requirements, filing bugs, etc. Yet with large teams, managing the social a...
Jason B. Ellis, Catalina Danis, Christine Halverso...
CHI
2011
ACM
13 years 1 months ago
Creek watch: pairing usefulness and usability for successful citizen science
Citizen science projects can collect a wealth of scientific data, but that data is only helpful if it is actually used. While previous citizen science research has mostly focused ...
Sunyoung Kim, Christine Robson, Thomas Zimmerman, ...
ESE
2002
112views Database» more  ESE 2002»
13 years 9 months ago
An Empirical Method for Selecting Software Reliability Growth Models
Estimating remaining defects or failures in software can help test managers make release decisions during testing. Several methods exist to estimate defect content, among them a v...
Catherine Stringfellow, Anneliese Amschler Andrews