Sciweavers

982 search results - page 169 / 197
» The reflective transformative design process
Sort
View
SAC
2010
ACM
13 years 8 months ago
Graph-based verification of static program constraints
Software artifacts usually have static program constraints and these constraints should be satisfied in each reuse. In addition to this, the developers are also required to satisf...
Selim Ciraci, Pim van den Broek, Mehmet Aksit
ICDE
2005
IEEE
101views Database» more  ICDE 2005»
14 years 9 months ago
GPIVOT: Efficient Incremental Maintenance of Complex ROLAP Views
Data warehousing and on-line analytical processing (OLAP) are essential for decision support applications. Common OLAP operations include for example drill down, roll up, pivot an...
Songting Chen, Elke A. Rundensteiner
WWW
2006
ACM
14 years 9 months ago
One document to bind them: combining XML, web services, and the semantic web
We present a paradigm for uniting the diverse strands of XML-based Web technologies by allowing them to be incorporated within a single document. This overcomes the distinction be...
Harry Halpin, Henry S. Thompson
WWW
2004
ACM
14 years 9 months ago
Web customization using behavior-based remote executing agents
ReAgents are remotely executing agents that customize Web browsing for non-standard resource-limited clients. A reAgent is essentially a "one-shot" mobile agent that act...
Eugene Hung, Joseph Pasquale
KDD
2007
ACM
192views Data Mining» more  KDD 2007»
14 years 8 months ago
Allowing Privacy Protection Algorithms to Jump Out of Local Optimums: An Ordered Greed Framework
Abstract. As more and more person-specific data like health information becomes available, increasing attention is paid to confidentiality and privacy protection. One proposed mode...
Rhonda Chaytor