Sciweavers

1432 search results - page 228 / 287
» A survey on context-aware systems
Sort
View
HICSS
2000
IEEE
101views Biometrics» more  HICSS 2000»
15 years 4 months ago
Strategic Management of IS/IT Functions: The Role of the CIO
Chief information officers (CIOs) have the difficult job of running a function that uses a lot of resources but offers little measurable evidence of its value. Line managers are i...
Petter Gottschalk, Nolan J. Taylor
ISD
1999
Springer
213views Database» more  ISD 1999»
15 years 4 months ago
A Probabilistic Approach to Environmental Change Detection with Area-Class Map Data
One of the primary methods of studying change in the natural and man-made environment is that of comparison of multi-date maps and images of the earth's surface. Such comparis...
Christopher B. Jones, J. Mark Ware, David R. Mille...
STACS
1997
Springer
15 years 4 months ago
Methods and Applications of (MAX, +) Linear Algebra
Exotic semirings such as the “(max, +) semiring” (R ∪ {−∞}, max, +), or the “tropical semiring” (N ∪ {+∞}, min, +), have been invented and reinvented many times s...
Stephane Gaubert, Max Plus
ICSE
2000
IEEE-ACM
15 years 3 months ago
Requirements engineering in the year 00: a research perspective
Requirements engineering (RE) is concerned with the identification of the goals to be achieved by the envisioned system, the operationalization of such goals into services and con...
Axel van Lamsweerde
CDC
2008
IEEE
149views Control Systems» more  CDC 2008»
15 years 1 months ago
Distributed computation under bit constraints
Abstract-- A network of nodes communicate via noisy channels. Each node has some real-valued initial measurement or message. The goal of each of the nodes is to acquire an estimate...
Ola Ayaso, Devavrat Shah, Munther A. Dahleh