Sciweavers

694 search results - page 23 / 139
» Representing and Applying Design Patterns: What Is the Probl...
Sort
View
MOBILITY
2009
ACM
14 years 1 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
CDC
2010
IEEE
221views Control Systems» more  CDC 2010»
13 years 3 months ago
Performance limitations of the servomechanism problem when the number of tracking/disturbance poles increases
In this paper, we study the cheap control problem and determine what some of the inherent system limitations are in achieving high performance for LTI systems. In particular, we ob...
Edward J. Davison, Simon Lam
KDD
2008
ACM
243views Data Mining» more  KDD 2008»
14 years 9 months ago
Permu-pattern: discovery of mutable permutation patterns with proximity constraint
Pattern discovery in sequences is an important problem in many applications, especially in computational biology and text mining. However, due to the noisy nature of data, the tra...
Meng Hu, Jiong Yang, Wei Su
KBSE
2007
IEEE
14 years 3 months ago
Inferring structural patterns for concern traceability in evolving software
As part of the evolution of software systems, effort is often invested to discover in what parts of the source code a feature (or other concern) is implemented. Unfortunately, kn...
Barthélémy Dagenais, Silvia Breu, Fr...
KBS
2000
59views more  KBS 2000»
13 years 8 months ago
Hands-on representations in a two-dimensional space for early stages of design
In design, problem analysis is as important as solution synthesis. Strategic knowledge is required not only for constructing a solution but also for framing a problem. While exter...
Yasuhiro Yamamoto, Kumiyo Nakakoji, Shingo Takada