Sciweavers

16404 search results - page 3224 / 3281
» A set coverage problem
Sort
View
119
Voted
IJSI
2008
156views more  IJSI 2008»
15 years 17 days ago
Co-Training by Committee: A Generalized Framework for Semi-Supervised Learning with Committees
Many data mining applications have a large amount of data but labeling data is often difficult, expensive, or time consuming, as it requires human experts for annotation. Semi-supe...
Mohamed Farouk Abdel Hady, Friedhelm Schwenker
117
Voted
INFSOF
2008
201views more  INFSOF 2008»
15 years 17 days ago
Motivation in Software Engineering: A systematic literature review
Objective: In this paper, we present a systematic literature review of motivation in Software Engineering. The objective of this review is to plot the landscape of current reporte...
Sarah Beecham, Nathan Baddoo, Tracy Hall, Hugh Rob...
99
Voted
CN
2007
92views more  CN 2007»
15 years 17 days ago
A new approach to dynamic bandwidth allocation in Quality of Service networks: Performance and bounds
Efficient dynamic resource provisioning algorithms are necessary to the development and automation of Quality of Service (QoS) networks. The main goal of these algorithms is to oļ...
Jocelyne Elias, Fabio Martignon, Antonio Capone, G...
106
Voted
IOR
2008
128views more  IOR 2008»
15 years 17 days ago
Promised Lead-Time Contracts Under Asymmetric Information
We study the important problem of how a supplier should optimally share the consequences of demand uncertainty (i.e., the cost of inventory excesses and shortages) with a retailer...
Holly Lutze, Özalp Özer
117
Voted
COMCOM
2007
100views more  COMCOM 2007»
15 years 17 days ago
Using the vulnerability information of computer systems to improve the network security
In these years, the security problem becomes more important to everyone using computers. However, vulnerabilities on computers are found so frequently that system managers can not...
Yeu-Pong Lai, Po-Lun Hsia
« Prev « First page 3224 / 3281 Last » Next »