Sciweavers

2384 search results - page 400 / 477
» Analyzing Requirements Engineering Processes: A Case Study
Sort
View
IJNM
2006
175views more  IJNM 2006»
14 years 12 months ago
An OPNET-based simulation approach for deploying VoIP
These days a massive deployment of VoIP is taking place over IP networks. VoIP deployment is a challenging task for network researchers and engineers. This paper presents a detaile...
Khaled Salah, A. Alkhoraidly
103
Voted
CIKM
2004
Springer
15 years 5 months ago
Local methods for estimating pagerank values
The Google search engine uses a method called PageRank, together with term-based and other ranking techniques, to order search results returned to the user. PageRank uses link ana...
Yen-Yu Chen, Qingqing Gan, Torsten Suel
COMPLEX
2009
Springer
15 years 6 months ago
Designing Capital-Intensive Systems with Architectural and Operational Flexibility Using a Screening Model
: Development of capital intensive systems, such as offshore oil platforms or other industrial infrastructure, generally requires a significant amount of capital investment under v...
Jijun Lin, Olivier de Weck, Richard de Neufville, ...
KDD
2008
ACM
104views Data Mining» more  KDD 2008»
16 years 8 days ago
Succinct summarization of transactional databases: an overlapped hyperrectangle scheme
Transactional data are ubiquitous. Several methods, including frequent itemsets mining and co-clustering, have been proposed to analyze transactional databases. In this work, we p...
Yang Xiang, Ruoming Jin, David Fuhry, Feodor F. Dr...
CHI
2010
ACM
15 years 6 months ago
ColorPIN: securing PIN entry through indirect input
Automated teller machine (ATM) frauds are increasing drastically these days. When analyzing the most common attacks and the reasons for successful frauds, it becomes apparent that...
Alexander De Luca, Katja Hertzschuch, Heinrich Hus...