Sciweavers

29 search results - page 6 / 6
» Calculators are needlessly bad
Sort
View
SECON
2007
IEEE
14 years 16 days ago
A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks
Abstract—While mechanisms exist to instantiate common security functionality such as confidentiality and integrity, little has been done to define a mechanism for identificati...
Damon McCoy, Douglas C. Sicker, Dirk Grunwald
CLEF
2005
Springer
13 years 11 months ago
The Use of MedGIFT and EasyIR for ImageCLEF 2005
This article describes the use of the medGIFT and easyIR retrieval systems for three of the four ImageCLEF 2005 retrieval tasks. We participated in the ad–hoc retrieval task that...
Henning Müller, Antoine Geissbühler, Joh...
SCAM
2003
IEEE
13 years 11 months ago
Managing Multi-Billion Dollar IT Budgets using Source Code Analysis
We present a quantitative approach for IT portfolio management. This is an approach that CMM level 1 organizations can use to obtain a corporate wide impression of the state of th...
Chris Verhoef
PRICAI
2000
Springer
13 years 9 months ago
Discovery of Shared Topics Networks among People - A Simple Approach to Find Community Knowledge from WWW Bookmarks
In this paper, we propose a system called kMedia that can assist users to form knowledge for community by showing shared topics networks (STN) among them. One of the important aspe...
Hideaki Takeda, Takeshi Matsuzuka, Yuichiro Tanigu...