Sciweavers

549 search results - page 58 / 110
» Belief-Based Risk Analysis
Sort
View
ICSE
2003
IEEE-ACM
15 years 12 months ago
Cost Estimation for Web Applications
In this paper, we investigate the application of the COBRATM method (Cost Estimation, Benchmarking, and Risk Assessment) in a new application domain, the area of web development. ...
Melanie Ruhe, D. Ross Jeffery, Isabella Wieczorek
ISPAN
2005
IEEE
15 years 5 months ago
Safety and QoS-Aware Management of Heterogeneous Sensor Networks
— Recently, we have proposed ANSWER: AutoNomouS Wireless sEnsor netwoRk as a service platform whose mission is to provide dependable information services to in-situ mobile users ...
Mohamed F. Younis, Waleed A. Youssef, Mohamed Elto...
DMS
2008
167views Multimedia» more  DMS 2008»
15 years 1 months ago
Testing Multi-agent Systems for Deadlock Detection Based on UML Models
There is a growing demand for Multi-Agent Systems (MAS) in the software industry. The autonomous agent interaction in a dynamic software environment can potentially lead to runtim...
Nariman Mani, Vahid Garousi, Behrouz Homayoun Far
HCI
2007
15 years 1 months ago
Musculoskeletal and Performance Effects of Monocular Display Augmented, Articulated Arm Based Laser Digitizing
Abstract. Processes of capturing solid geometry features as threedimensional data for analysis, simulation, or reverse engineering require the use of laser-based reverse engineerin...
Neil Littell, Kari Babski-Reeves, Gary McFadyen, J...
SDM
2007
SIAM
204views Data Mining» more  SDM 2007»
15 years 1 months ago
Flexible Anonymization For Privacy Preserving Data Publishing: A Systematic Search Based Approach
k-anonymity is a popular measure of privacy for data publishing: It measures the risk of identity-disclosure of individuals whose personal information are released in the form of ...
Bijit Hore, Ravi Chandra Jammalamadaka, Sharad Meh...