Sciweavers

4781 search results - page 425 / 957
» Complexity at large
Sort
View
ICST
2010
IEEE
15 years 3 months ago
Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista
—Many factors are believed to increase the vulnerability of software system; for example, the more widely deployed or popular is a software system the more likely it is to be att...
Thomas Zimmermann, Nachiappan Nagappan, Laurie A. ...
INFFUS
2010
143views more  INFFUS 2010»
15 years 3 months ago
A multi-agent systems approach to distributed bayesian information fusion
This paper introduces design principles for modular Bayesian fusion systems which can (i) cope with large quantities of heterogeneous information and (ii) can adapt to changing co...
Gregor Pavlin, Patrick de Oude, Marinus Maris, Jan...
JUCS
2010
141views more  JUCS 2010»
15 years 3 months ago
Trust-Oriented Composite Service Selection with QoS Constraints
Abstract: In Service-Oriented Computing (SOC) environments, service clients interact with service providers for consuming services. From the viewpoint of service clients, the trust...
Lei Li, Yan Wang, Ee-Peng Lim
MA
2010
Springer
140views Communications» more  MA 2010»
15 years 3 months ago
The Dirichlet Markov Ensemble
We equip the polytope of n × n Markov matrices with the normalized trace of the Lebesgue measure of Rn2 . This probability space provides random Markov matrices, with i.i.d. rows...
Djalil Chafaï
SCHEDULING
2010
116views more  SCHEDULING 2010»
15 years 3 months ago
On supporting Lean methodologies using constraint-based scheduling
Lean Manufacturing often simply referred to as Lean is a process management philosophy that aims to improve the way in which products are manufactured. It does this through ide...
Roman van der Krogt, John Geraghty, Mustafa Ramzi ...