Buscar
Mostrando ítems 51-60 de 108
Capítulo de Libro
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
A Comparative Study of Machine Learning Regression Methods on LiDAR Data: A Case Study
(Springer, 2014)
Light Detection and Ranging (LiDAR) is a remote sensor able to extract vertical information from sensed objects. LiDAR-derived information is nowadays used to develop environmental models for describing fire behaviour ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Towards a Formal Specification of SLAs with Compensations
(2014)
In Cooperative Information Systems, service level agreements (SLA) can be used to describe the rights and obligations of parties involved in the transaction (typically the service consumer and the service provider); amongst ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Dynamic Topic-Related Tweet Retrieval
(ACM, 2014)
Twitter is a social network in which people publish publicly accessible brief, instant messages. With its exponential growth and the public nature and transversality of its contents, more researchers are using Twitter ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Managing CALIPSOneo Project: Learning from Trenches
(Association for Information Systems (AIS), 2014)
The model-driven engineering paradigm is a paradigm that combines the power of concepts and its relations, using abstracts models in order to offer suitable mechanisms for software development. In fact, software ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Runtime Enforcement of Dynamic Security Policies
(Springer, 2014)
The security policies of an application can change at runtime due to several reasons, as for example the changes on the user preferences, the lack of enough resources in mobile environments or the negotiation of security ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Towards Pattern-Based Optimization of Cloud Applications
(CEUR-WS, 2014)
With the promise of seemingly unlimited resources and the flexible pay-as-you-go business model, more and more applications are moving to the cloud. However, to fully utilize the features offered by cloud providers, the ...
Ponencia
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
From Out-Place Transformation Evolution to In-Place Model Patching
(ACM Digital Library, 2014)
Model transformation is a key technique to automate software engineering tasks. Like any other software, transformations are not resilient to change. As changes to transformations can invalidate previously produced ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Trinity: On Using Trinary Trees for Unsupervised Web Data Extraction
(IEEE Xplore, 2014-06)
Web data extractors are used to extract data from web documents in order to feed automated processes. In this article, we propose a technique that works on two or more web documents generated by the same server-side template ...