Sciweavers

4250 search results - page 162 / 850
» Understanding the Requirements on Modelling Techniques
Sort
View
NIPS
1992
13 years 10 months ago
Hidden Markov Model} Induction by Bayesian Model Merging
This paper describes a technique for learning both the number of states and the topologyof Hidden Markov Models from examples. The inductionprocess starts with the most specific m...
Andreas Stolcke, Stephen M. Omohundro
ICSE
2010
IEEE-ACM
13 years 11 months ago
EMFStore: a model repository for EMF models
Models need to be put under version control to facilitate collaboration and to control change. EMFStore is a Software Configuration Management system tailored to the specific re...
Maximilian Koegel, Jonas Helming
ISSA
2004
13 years 10 months ago
A Unified Architecture For Automatic Software Updates
This paper attempts to address the issue of hardening the internal security of an organisation's network by easing its patch management. Traditionally security has been model...
Dominic White
CMS
2006
127views Communications» more  CMS 2006»
13 years 10 months ago
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication
Abstract. There are a number of attacker models in the area of anonymous communication. Most of them are either very simplified or pretty abstract - therefore difficult to generali...
Andriy Panchenko, Lexi Pimenidis
MHCI
2009
Springer
14 years 3 months ago
The mobile Oracle: a tool for early user involvement
This paper describes a novel tool for eliciting user requirements early in the design process of mobile applications. The “Mobile Oracle”, as we have called it, is intended to...
Charlotte Magnusson, Martin Pielot, Margarita Anas...