Sciweavers

3793 search results - page 591 / 759
» An Object Data Model with Roles
Sort
View
103
Voted
ENGL
2007
100views more  ENGL 2007»
15 years 18 days ago
Utilizing Computational Intelligence to Assist in Software Release Decision
—Defect tracking using computational intelligence methods is used to predict software readiness in this study. By comparing predicted number of faults and number of faults discov...
Tong-Seng Quah, Mie Mie Thet Thwin
103
Voted
CDC
2010
IEEE
203views Control Systems» more  CDC 2010»
14 years 7 months ago
Cyber security analysis of state estimators in electric power systems
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power grids. Safe and reliable operation o...
André Teixeira, Saurabh Amin, Henrik Sandbe...
214
Voted
ICDE
2005
IEEE
120views Database» more  ICDE 2005»
16 years 2 months ago
Progressive Distributed Top k Retrieval in Peer-to-Peer Networks
Query processing in traditional information management systems has moved from an exact match model to more flexible paradigms allowing cooperative retrieval by aggregating the dat...
Wolf-Tilo Balke, Wolfgang Nejdl, Wolf Siberski, Uw...
ELPUB
2006
ACM
15 years 6 months ago
A New Concept in High Resolution Internet Image Browsing
Various new imaging techniques have been used at the C2RMF, in order to digitize paintings and objects. These techniques are used for extensive and detailed non-destructive analys...
Denis Pitzalis, Ruven Pillay, Christian Lahanier
JODI
2010
115views more  JODI 2010»
14 years 7 months ago
ICE-Theorem - End to end semantically aware eResearch infrastructure for theses
: ICE-TheOREM was a project which made several important contributions to the repository domain, promoting deposit by integrating the repository with authoring workflows and enhanc...
Peter Sefton, Jim Downing