Sciweavers

676 search results - page 89 / 136
» Mining Patterns to Support Software Architecture Evaluation
Sort
View
GRID
2007
Springer
15 years 4 months ago
The Requirements of Using Provenance in e-Science Experiments
In e-Science experiments, it is vital to record the experimental process for later use such as in interpreting results, verifying that the correct process took place or tracing whe...
Simon Miles, Paul T. Groth, Miguel Branco, Luc Mor...
CHI
2011
ACM
14 years 7 months ago
MemTable: an integrated system for capture and recall of shared histories in group workspaces
This paper presents the design, implementation, and evaluation of an interactive tabletop system that supports co-located meeting capture and asynchronous search and review of pas...
Seth E. Hunter, Pattie Maes, Stacey D. Scott, Henr...
ICWE
2005
Springer
15 years 9 months ago
Discovering Re-usable Design Solutions in Web Conceptual Schemas: Metrics and Methodology
Abstract. In the Internet era, the development of Web applications has impressively evolved and is characterized by a large degree of complexity. To this end, software community ha...
Yannis Panagis, Evangelos Sakkopoulos, Spiros Sirm...
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
16 years 4 months ago
Query result clustering for object-level search
Query result clustering has recently attracted a lot of attention to provide users with a succinct overview of relevant results. However, little work has been done on organizing t...
Jongwuk Lee, Seung-won Hwang, Zaiqing Nie, Ji-Rong...
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
15 years 8 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...