Sciweavers

391 search results - page 50 / 79
» Requirements Elicitation Using a Combination of Prototypes a...
Sort
View
ICDM
2010
IEEE
119views Data Mining» more  ICDM 2010»
13 years 7 months ago
Visually Controllable Data Mining Methods
A large number of data mining methods are, as such, not applicable to fast, intuitive, and interactive use. Thus, there is a need for visually controllable data mining methods. Suc...
Kai Puolamäki, Panagiotis Papapetrou, Jefrey ...
CCS
2006
ACM
14 years 20 days ago
Providing witness anonymity in peer-to-peer systems
In this paper, we introduce the concept of witness anonymity for peer-to-peer systems. Witness anonymity combines the seemingly conflicting requirements of anonymity (for honest p...
Bo Zhu, Sanjeev Setia, Sushil Jajodia
EUROMICRO
1997
IEEE
14 years 1 months ago
The Harpoon security system for helper programs on a Pocket Companion
In this paper we present a security framework for executing foreign programs, called helpers, on a Pocket Companion: a wireless hand-held computer. A helper program as proposed is...
Gerard J. M. Smit, Paul J. M. Havinga, Daniël...
ICDE
2006
IEEE
115views Database» more  ICDE 2006»
14 years 3 months ago
Integration Workbench: Integrating Schema Integration Tools
A key aspect of any data integration endeavor is establishing a transformation that translates instances of one or more source schemata into instances of a target schema. This sch...
Peter Mork, Arnon Rosenthal, Leonard J. Seligman, ...
DAIS
2003
13 years 10 months ago
Jironde: A Flexible Framework for Making Components Transactional
Abstract. It is generally agreed that one of the key services of componentbased systems are transactions. However, an agreement on how components should be involved in transactions...
Marek Prochazka