Suppose you have a Java Server application, and some of the runtime binaries in that application are external to your application. Generated image files, compiled Silverlight components in your pages, or resource files which are managed by an external team. Much like the jar files used by your application, these external binaries can be seen…
R. Cole, P. Eklund, and G. Stumme. Principles of Data Mining and Knowledge Discovery. Proc. PKDD 2000, volume 1910 of LNAI, page 367-374. Heidelberg-Berlin, Springer, (2000)
D. Millen, J. Feinberg, and B. Kerr. CHI '06: Proceedings of the SIGCHI conference on Human Factors in computing systems, page 111--120. New York, NY, USA, ACM Press, (2006)
R. Cole, P. Eklund, and G. Stumme. Principles of Data Mining and Knowledge Discovery. Proc. PKDD 2000, volume 1910 of LNAI, page 367-374. Heidelberg-Berlin, Springer, (2000)Part of cole03document.
R. Cole, and G. Stumme. Conceptual Structures: Logical, Linguistic, and Computational Issues. Proc. ICCS '00, volume 1867 of LNAI, page 438-452. Heidelberg, Springer, (2000)Part of cole03document.
R. Cole, and G. Stumme. Conceptual Structures: Logical, Linguistic, and Computational Issues. Proc. ICCS '00, volume 1867 of LNAI, page 438-452. Heidelberg, Springer, (2000)Part of cole03document.