Sciweavers

2615 search results - page 363 / 523
» Analysis of Real Time Operating System Based Applications
Sort
View
ICIA
2007
15 years 5 months ago
Effectiveness of Mobile Recommender Systems for Tourist Destinations: A User Evaluation
Mobile recommender systems have the potential to substantially enrich tourist experiences. As their handling marks a big challenge for ordinary users, its acceptance can only be e...
Marko Modsching, Ronny Kramer, Klaus ten Hagen, Ul...
ISDA
2010
IEEE
15 years 1 months ago
Comparing SVM ensembles for imbalanced datasets
Real life datasets often suffer from the problem of class imbalance, which thwarts supervised learning process. In such data sets examples of positive (minority) class are signific...
Vasudha Bhatnagar, Manju Bhardwaj, Ashish Mahabal
CORR
2010
Springer
155views Education» more  CORR 2010»
15 years 18 days ago
A Proof Theoretic Analysis of Intruder Theories
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages under the theory of ...
Alwen Tiu, Rajeev Goré, Jeremy E. Dawson
HICSS
2003
IEEE
137views Biometrics» more  HICSS 2003»
15 years 8 months ago
Adjusting Safety Stock Requirements with an AHP-Based Risk Analysis
In most cases safety stock is determined based on the variability of the demand and lead time. The focus has been on the statistics and past performance, and the existing framewor...
Jukka Korpela, Antti Lehmusvaara, Kalevi Kylä...
120
Voted
SRDS
2007
IEEE
15 years 9 months ago
Quantifying Temporal and Spatial Correlation of Failure Events for Proactive Management
Networked computing systems continue to grow in scale and in the complexity of their components and interactions. Component failures become norms instead of exceptions in these en...
Song Fu, Cheng-Zhong Xu