Sciweavers

179 search results - page 12 / 36
» Specification of Software Component Requirements Using the T...
Sort
View
ISSRE
2010
IEEE
13 years 5 months ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...
ICPR
2000
IEEE
14 years 7 months ago
Sign of Gaussian Curvature from Eigen Plane Using Principal Components Analysis
This paper describes a new method to recover the sign of the local Gaussian curvature at each point on the visible surface of a 3-D object. Multiple (p > 3) shaded images are a...
Shinji Fukui, Yuji Iwahori, Akira Iwata, Robert J....
KDD
2002
ACM
112views Data Mining» more  KDD 2002»
14 years 7 months ago
From run-time behavior to usage scenarios: an interaction-pattern mining approach
A key challenge facing IT organizations today is their evolution towards adopting e-business practices that gives rise to the need for reengineering their underlying software syst...
Mohammad El-Ramly, Eleni Stroulia, Paul G. Sorenso...
SIGMOD
2008
ACM
107views Database» more  SIGMOD 2008»
14 years 6 months ago
Outlier-robust clustering using independent components
How can we efficiently find a clustering, i.e. a concise description of the cluster structure, of a given data set which contains an unknown number of clusters of different shape ...
Christian Böhm, Christos Faloutsos, Claudia P...
POPL
2005
ACM
14 years 7 months ago
Synthesis of interface specifications for Java classes
While a typical software component has a clearly specified (static) interface in terms of the methods and the input/output types they support, information about the correct sequen...
P. Madhusudan, Pavol Cerný, Rajeev Alur, Wo...