Sciweavers

1217 search results - page 205 / 244
» On compressing frequent patterns
Sort
View
109
Voted
VAMOS
2007
Springer
15 years 9 months ago
Requirements Modelling and Design Notations for Software Product Lines
Although feature modelling is a frequently used approach to the task of modelling commonality and variability within product lines, there is currently no standard modelling notati...
T. John Brown, Rachel Gawley, Ivor T. A. Spence, P...
ACSAC
2006
IEEE
15 years 9 months ago
A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs
In healthcare, role-based access control systems are often extended with exception mechanisms to ensure access to needed informationeven when the needs don’t followthe expected ...
Lillian Røstad, Ole Edsberg
155
Voted
AIPR
2006
IEEE
15 years 9 months ago
Data Fusion, De-noising, and Filtering to Produce Cloud-Free High Quality Temporal Composites Employing Parallel Temporal Map Al
Remotely sensed images from satellite sensors such as MODIS Aqua and Terra provide high temporal resolution and wide area coverage. Unfortunately, these images frequently include ...
Bijay Shrestha, Charles G. O'Hara, Preeti Mali
130
Voted
GLOBECOM
2006
IEEE
15 years 9 months ago
FEAT: Improving Accuracy in End-to-end Available Bandwidth Measurement
—This report describes our ongoing work on a new end-to-end available-bandwidth measurement tool: FEAT (Fish-Eye Availablebandwidth Tool). FEAT features a new dynamic pattern of ...
Qiang Wang, Liang Cheng
116
Voted
HICSS
2006
IEEE
124views Biometrics» more  HICSS 2006»
15 years 9 months ago
Gatekeeping in Virtual Communities: On Politics of Power in Cyberspace
Gatekeeping/Information Control is exercised frequently and daily in virtual communities. Gatekeeping exists in four different levels: Regulators, service providers, communitiesâ€...
Karine Barzilai-Nahon