Sciweavers

4349 search results - page 353 / 870
» A Comprehensive Process Model for Studying Software Process ...
Sort
View
CORR
2010
Springer
99views Education» more  CORR 2010»
15 years 4 months ago
A Markov Chain Model for the Analysis of Round-Robin Scheduling Scheme
---------------------------------------------------ABSTRACT-----------------------------------------------In the literature of Round-Robin scheduling scheme, each job is processed,...
D. Shukla, Saurabh Jain, Rahul Singhai, R. K. Agar...
HICSS
2000
IEEE
129views Biometrics» more  HICSS 2000»
15 years 9 months ago
Understanding the Plant Level Costs and Benefits of ERP: Will the Ugly Duckling Always Turn into a Swan?
This paper explores the impact of Enterprise Resource Planning (ERP) systems using the individual manufacturing facility as the level of analysis. A model of ERP costs and benefit...
Thomas F. Gattiker, Dale Goodhue
SIGCOMM
2000
ACM
15 years 9 months ago
A stochastic model of TCP/IP with stationary random
In this paper, we present a model for TCP/IP ow control mechanism. The rate at which data is transmitted increases linearly in time until a packet loss is detected. At that point,...
Eitan Altman, Konstantin Avrachenkov, Chadi Baraka...
ICIP
2003
IEEE
16 years 6 months ago
Unsupervised Bayesian image segmentation using wavelet-domain hidden Markov models
In this paper, we study unsupervised image segmentation using wavelet-domain hidden Markov models (HMMs). We first review recent supervised Bayesian image segmentation algorithms ...
X. Song, G. Fan
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 9 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw