標(biāo)題: Titlebook: Eternal Systems; First International Alessandro Moschitti,Riccardo Scandariato Conference proceedings 2012 The Editor(s) (if applicable) a [打印本頁(yè)] 作者: 決絕 時(shí)間: 2025-3-21 16:36
書目名稱Eternal Systems影響因子(影響力)
書目名稱Eternal Systems影響因子(影響力)學(xué)科排名
書目名稱Eternal Systems網(wǎng)絡(luò)公開度
書目名稱Eternal Systems網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Eternal Systems被引頻次
書目名稱Eternal Systems被引頻次學(xué)科排名
書目名稱Eternal Systems年度引用
書目名稱Eternal Systems年度引用學(xué)科排名
書目名稱Eternal Systems讀者反饋
書目名稱Eternal Systems讀者反饋學(xué)科排名
作者: Hdl348 時(shí)間: 2025-3-21 23:03
Eternal Systems978-3-642-28033-7Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: Aesthete 時(shí)間: 2025-3-22 03:48
Alessandro Moschitti,Riccardo ScandariatoState-of-the-art research.Fast-track conference proceedings.Unique visibility作者: 注射器 時(shí)間: 2025-3-22 08:27 作者: 表示問(wèn) 時(shí)間: 2025-3-22 09:54 作者: 無(wú)法解釋 時(shí)間: 2025-3-22 14:15 作者: 無(wú)法解釋 時(shí)間: 2025-3-22 18:48
https://doi.org/10.1007/978-981-13-2435-2d by the necessity to evolve requirements continuously, even after the deployment. In this paper we focus on the evolution of security requirements and introduce an integrated process to drive runtime reconfiguration from requirements changes. This process relies on two key proposals: systematic str作者: FLIC 時(shí)間: 2025-3-22 21:37
Ray Chang,Peng-Yuan Wang,Ching-Li Tsengructure present in the data under interest. Kernel methods represent a rich family of techniques that harvest on this principle. Domain-specific kernels are able to exploit rich structural information present in the input data to deliver state of the art results in many application areas, e.g. natur作者: 不確定 時(shí)間: 2025-3-23 03:49
https://doi.org/10.1007/978-981-13-6244-6g and relevant research topic. These techniques are very important as they can significantly support a Maintainer in his/her tasks by grouping related entities of a large system into smaller and easier to comprehend subsystems..In this paper we investigate the effectiveness of combining information 作者: Crohns-disease 時(shí)間: 2025-3-23 07:04 作者: adroit 時(shí)間: 2025-3-23 10:04 作者: 鉆孔 時(shí)間: 2025-3-23 17:10
Masaki Yoshida,Takayuki Fujiwaraovided tags lack consistency and present numerous irregularities. Addressing the challenge of simplifying and improving the process of tagging online videos, which is potentially not bounded to any particular domain, we present an algorithm for predicting user-tags from the associated textual metada作者: 心胸狹窄 時(shí)間: 2025-3-23 19:22 作者: hermitage 時(shí)間: 2025-3-23 23:37 作者: Contend 時(shí)間: 2025-3-24 05:34
https://doi.org/10.1007/978-3-642-28033-7cloud computing; formal verification; information retrieval; natural language processing; software evolu作者: disparage 時(shí)間: 2025-3-24 09:24 作者: jumble 時(shí)間: 2025-3-24 13:41
Behaviour-Based Object Classifier for Surveillance Videosn semantic categories to the individual blobs extracted from surveillance videos. The proposed classification framework has been evaluated against conventional object classifiers based on visual features extracted from semantic categories defined on AVSS 2007 surveillance dataset.作者: Discrete 時(shí)間: 2025-3-24 18:40
Requirements-Driven Runtime Reconfiguration for Securityd introduce an integrated process to drive runtime reconfiguration from requirements changes. This process relies on two key proposals: systematic strategies to evolve architecture models according to security requirements evolution and the combination of reflective middleware and models@runtime for runtime reconfiguration.作者: GEST 時(shí)間: 2025-3-24 19:10 作者: Cantankerous 時(shí)間: 2025-3-25 01:41 作者: 自然環(huán)境 時(shí)間: 2025-3-25 06:42
Conference proceedings 2012in May 2011. The workshop aimed at creating the conditions for mutual awareness and cross-fertilization among broad ICT areas such as learning systems for knowledge management and representation, software systems, networked systems and secure systems, by focusing on their shared objectives such as a作者: Infect 時(shí)間: 2025-3-25 08:31
1865-0929 t International Workshop on Eternal Systems, EternalS 2011, held in Budapest, Hungary, in May 2011. The workshop aimed at creating the conditions for mutual awareness and cross-fertilization among broad ICT areas such as learning systems for knowledge management and representation, software systems,作者: antidote 時(shí)間: 2025-3-25 14:54
https://doi.org/10.1007/978-981-13-2435-2d introduce an integrated process to drive runtime reconfiguration from requirements changes. This process relies on two key proposals: systematic strategies to evolve architecture models according to security requirements evolution and the combination of reflective middleware and models@runtime for runtime reconfiguration.作者: Hypopnea 時(shí)間: 2025-3-25 17:34
Conference proceedings 2012ed were carefully reviewed and selected from 15 submissions. They are organized in topical sections on software and secure systems, machine learning for software systems, and ontology and knowledge representations.作者: Endearing 時(shí)間: 2025-3-25 23:18 作者: 時(shí)代 時(shí)間: 2025-3-26 03:52 作者: 一起 時(shí)間: 2025-3-26 07:56
Vitreoretinal Surgery Instrumentsn the real system whenever possible. The optimizations allow us to apply active learning to an industry-scale web-application running on an enterprise platform: the . (.) an online service-oriented manuscript submission and review system.作者: 6Applepolish 時(shí)間: 2025-3-26 09:01
Inga Zinicovscaia,Liliana Cepoit of ongoing work of the LivingKnowledge project: the News Media Analysis application for the semi-automation of the work of a media analysis company and the Future Predictor application which allows exploration of claims that are made through time.作者: Conjuction 時(shí)間: 2025-3-26 15:54 作者: 占線 時(shí)間: 2025-3-26 19:44 作者: 失望未來(lái) 時(shí)間: 2025-3-26 22:48 作者: archaeology 時(shí)間: 2025-3-27 02:53 作者: conceal 時(shí)間: 2025-3-27 07:55
Large-Scale Learning with Structural Kernels for Class-Imbalanced Datasetscale tasks. More specifically, we propose two important enhancements of the approximate cutting plane algorithm to train Support Vector Machines with structural kernels: (i) a new sampling strategy to handle class-imbalanced problem; and (ii) a parallel implementation, which makes the training scale作者: Mendacious 時(shí)間: 2025-3-27 10:05 作者: Anecdote 時(shí)間: 2025-3-27 14:31
Predicting User Tags Using Semantic Expansionof-articles algorithm for effectively searching through the Wikipedia articles for extracting relevant articles. The proposed framework has been evaluated against MediaEval 2010 Wild Wild Web dataset, which consists of large collection of Internet videos.作者: 教育學(xué) 時(shí)間: 2025-3-27 20:43
1865-0929 ey are organized in topical sections on software and secure systems, machine learning for software systems, and ontology and knowledge representations.978-3-642-28032-0978-3-642-28033-7Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 沙漠 時(shí)間: 2025-3-27 22:48 作者: 無(wú)法治愈 時(shí)間: 2025-3-28 05:56
https://doi.org/10.1007/978-981-13-6244-6ments, and source code statements. Moreover their relevance is estimated on the basis of the project characteristics, by applying a machine learning approach based on a probabilistic model and on the Expectation-Maximization algorithm. To group source files accordingly, two clustering algorithms hav作者: overreach 時(shí)間: 2025-3-28 06:35
Masaki Yoshida,Takayuki Fujiwaraof-articles algorithm for effectively searching through the Wikipedia articles for extracting relevant articles. The proposed framework has been evaluated against MediaEval 2010 Wild Wild Web dataset, which consists of large collection of Internet videos.作者: Narrative 時(shí)間: 2025-3-28 14:08
Comparing Structure-Oriented and Behavior-Oriented Variability Modeling for Workflowsty modeling is a way of keeping track at the model level of the currently supported and used workflow variants. Variability modeling approaches for workflows address two directions: structure-oriented approaches explicitly specify the workflow variants by means of linguistic constructs, while behavi作者: 親密 時(shí)間: 2025-3-28 18:19 作者: Gerontology 時(shí)間: 2025-3-28 21:08
Requirements-Driven Runtime Reconfiguration for Securityd by the necessity to evolve requirements continuously, even after the deployment. In this paper we focus on the evolution of security requirements and introduce an integrated process to drive runtime reconfiguration from requirements changes. This process relies on two key proposals: systematic str作者: nominal 時(shí)間: 2025-3-29 00:58