Sciweavers

6106 search results - page 1072 / 1222
» Modes for Software Architectures
Sort
View
115
Voted
UM
2007
Springer
15 years 9 months ago
Respecting Users' Individual Privacy Constraints in Web Personalization
Web personalization has demonstrated to be advantageous for both online customers and vendors. However, its benefits may be severely counteracted by privacy constraints. Personaliz...
Yang Wang 0005, Alfred Kobsa
126
Voted
AICCSA
2006
IEEE
101views Hardware» more  AICCSA 2006»
15 years 9 months ago
Refactoring Tools and Complementary Techniques
Poorly designed software systems are difficult to understand and maintain. Modifying code in one place could lead to unwanted repercussions elsewhere due to high coupling. Adding ...
Martin Drozdz, Derrick G. Kourie, Bruce W. Watson,...
111
Voted
COMSWARE
2006
IEEE
15 years 9 months ago
Utilizing network features for privacy violation detection
Privacy, its violations and techniques to circumvent privacy violation have grabbed the centre-stage of both academia and industry in recent months. Corporations worldwide have be...
Jaijit Bhattacharya, Rajanish Dass, Vishal Kapoor,...
CRV
2006
IEEE
206views Robotics» more  CRV 2006»
15 years 9 months ago
Toward an Application of Content-Based Video Indexing to Computer- Assisted Descriptive Video
This paper presents the status of a project targeting the development of content-based video indexing tools, to assist a human in the generation of descriptive video for the hard ...
Langis Gagnon, France Laliberté, Marc Lalon...
DATE
2006
IEEE
125views Hardware» more  DATE 2006»
15 years 9 months ago
Formal performance analysis and simulation of UML/SysML models for ESL design
UML2 and SysML try to adopt techniques known from software development to systems engineering. However, the focus has been put on modeling aspects until now and quantitative perfo...
Alexander Viehl, Timo Schönwald, Oliver Bring...
« Prev « First page 1072 / 1222 Last » Next »