Sciweavers

12373 search results - page 2311 / 2475
» Semi-Logarithmic Number Systems
Sort
View
120
Voted
ECOOP
2008
Springer
15 years 5 months ago
Flow Analysis of Code Customizations
Inconsistency between metadata and code customizations is a major concern in modern, configurable enterprise systems. The increasing reliance on metadata, in the form of XML files,...
Anders Hessellund, Peter Sestoft
158
Voted
EMS
2008
IEEE
15 years 5 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
120
Voted
ESWS
2008
Springer
15 years 5 months ago
Combining Fact and Document Retrieval with Spreading Activation for Semantic Desktop Search
Abstract. The Semantic Desktop is a means to support users in Personal Information Management (PIM). It provides an excellent test bed for Semantic Web technology: resources (e. g....
Kinga Schumacher, Michael Sintek, Leo Sauermann
146
Voted
EWCBR
2008
Springer
15 years 5 months ago
Forgetting Reinforced Cases
To meet time constraints, a CBR system must control the time spent searching in the case base for a solution. In this paper, we presents the results of a case study comparing the p...
Houcine Romdhane, Luc Lamontagne
141
Voted
ATMOS
2008
124views Optimization» more  ATMOS 2008»
15 years 5 months ago
Simultaneous Network Line Planning and Traffic Assignment
One of the basic problems in strategic planning of public and rail transport is the line planning problem to find a system of lines and its associated frequencies. The objectives o...
Karl Nachtigall, Karl Jerosch
« Prev « First page 2311 / 2475 Last » Next »