Sciweavers

434 search results - page 46 / 87
» The Case for Browser Provenance
Sort
View
ESA
2000
Springer
73views Algorithms» more  ESA 2000»
14 years 9 days ago
K-D Trees Are Better when Cut on the Longest Side
We show that a popular variant of the well known k-d tree data structure satisfies an important packing lemma. This variant is a binary spatial partitioning tree T defined on a set...
Matthew Dickerson, Christian A. Duncan, Michael T....
BPM
2008
Springer
192views Business» more  BPM 2008»
13 years 10 months ago
Trace Clustering in Process Mining
Process mining has proven to be a valuable tool for analyzing operational process executions based on event logs. Existing techniques perform well on structured processes, but stil...
Minseok Song, Christian W. Günther, Wil M. P....
ESEM
2007
ACM
13 years 10 months ago
Assessing, Comparing, and Combining Statechart- based testing and Structural testing: An Experiment
An important number of studies have addressed the importance of models in software engineering, mainly in the design of robust software systems. Although models have been proven t...
Samar Mouchawrab, Lionel C. Briand, Yvan Labiche
ECSA
2010
Springer
13 years 9 months ago
Model-based enhancement of software performance for precision critical systems
Architectural level analysis of a software system for its quality attributes is a proven cost-effective approach. This is particularly significant for performance, which defines m...
Naeem Muhammad, Nelis Boucké, Yolande Berbe...
CORR
2008
Springer
89views Education» more  CORR 2008»
13 years 8 months ago
Information Theoretic Operating Regimes of Large Wireless Networks
In analyzing the point-to-point wireless channel, insights about two qualitatively different operating regimes-bandwidth- and power-limited--have proven indispensable in the design...
Ayfer Özgür, Ramesh Johari, David N. C. ...