Sciweavers

822 search results - page 157 / 165
» Visualization techniques utilizing the sensitivity analysis ...
Sort
View
CCS
2004
ACM
14 years 1 months ago
MAC and UML for secure software design
Security must be a first class citizen in the design of large scale, interacting, software applications, at early and all stages of the lifecycle, for accurate and precise policy ...
Thuong Doan, Steven A. Demurjian, T. C. Ting, Andr...
MIR
2010
ACM
325views Multimedia» more  MIR 2010»
13 years 10 months ago
A classification-driven similarity matching framework for retrieval of biomedical images
This paper presents a classification-driven biomedical image retrieval system to bride the semantic gap by transforming image features to their global categories at different gran...
Md. Mahmudur Rahman, Sameer Antani, George R. Thom...
WWW
2009
ACM
14 years 9 months ago
Extracting community structure through relational hypergraphs
Social media websites promote diverse user interaction on media objects as well as user actions with respect to other users. The goal of this work is to discover community structu...
Yu-Ru Lin, Jimeng Sun, Paul Castro, Ravi B. Konuru...
SERP
2003
13 years 9 months ago
A Process for BDI Agent-Based Software Construction
Agent-based programming comes us as a next generation programming paradigm. However, we have not been ready yet to fully use it without having sound and concrete software engineer...
Chang-Hyun Jo, Jeffery M. Einhorn
IJCAI
1989
13 years 9 months ago
Functional Representation of Designs and Redesign Problem Solving
gn problem can be abstractly characterized as a constrained function-to-structure mapping. The de­ sign task takes as input the specifications of the desired functions of a device...
Ashok K. Goel, B. Chandrasekaran