Sciweavers

2131 search results - page 353 / 427
» Multi-Agent System Development: Design, Runtime, and Analysi...
Sort
View
KDD
2004
ACM
114views Data Mining» more  KDD 2004»
14 years 9 months ago
Mining reference tables for automatic text segmentation
Automatically segmenting unstructured text strings into structured records is necessary for importing the information contained in legacy sources and text collections into a data ...
Eugene Agichtein, Venkatesh Ganti
ICMCS
2008
IEEE
144views Multimedia» more  ICMCS 2008»
14 years 3 months ago
Enabling access to sound archives through integration, enrichment and retrieval
Many digital sound archives still suffer from tremendous problems concerning access. Materials are often in different formats, with related media in separate collections, and with...
Ivan Damnjanovic, Josh Reiss, Dan Barry
VOTEID
2007
Springer
14 years 3 months ago
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Komminist Weldemariam, Adolfo Villafiorita, Andrea...
DSVIS
2005
Springer
14 years 2 months ago
Towards Model Checking Stochastic Aspects of the thinkteam User Interface
Abstract. Stochastic model checking is a recent extension of traditional modelchecking techniques for the integrated analysis of both qualitative and quantitative system properties...
Maurice H. ter Beek, Mieke Massink, Diego Latella
AOSD
2004
ACM
14 years 2 months ago
Deriving security requirements from crosscutting threat descriptions
It is generally accepted that early determination of the stakeholder requirements assists in the development of systems that better meet the needs of those stakeholders. General s...
Charles B. Haley, Robin C. Laney, Bashar Nuseibeh