Sciweavers

416 search results - page 53 / 84
» Enough of Processes - Lets do Practices
Sort
View
TKDE
2010
153views more  TKDE 2010»
14 years 8 months ago
Automatic Ontology Matching via Upper Ontologies: A Systematic Evaluation
—“Ontology matching” is the process of finding correspondences between entities belonging to different ontologies. This paper describes a set of algorithms that exploit uppe...
Viviana Mascardi, Angela Locoro, Paolo Rosso
ICST
2008
IEEE
15 years 4 months ago
Model-Based Testing of Automotive Systems
In recent years the development of automotive embedded devices has changed from an electrical and mechanical engineering discipline to a combination of software and electrical/mec...
Eckard Bringmann, Andreas Krämer
CCS
2005
ACM
15 years 3 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
90
Voted
ICCBR
2001
Springer
15 years 2 months ago
Case-Based Reasoning in the Care of Alzheimer's Disease Patients
Abstract. Planning the ongoing care of Alzheimer's Disease (AD) patients is a complex task, marked by cases that change over time, multiple perspectives, and ethical issues. G...
Cynthia R. Marling, Peter Whitehouse
IJCSS
2006
110views more  IJCSS 2006»
14 years 9 months ago
Business Engineering with Mobile Workforce Solutions
An analysis framework is presented that can be used to assess important issues of mobile workforce solutions, based on recent literature on mobile business. Within this framework ...
Yan Wang, Elisabeth van de Kar, Geleyn R. Meijer, ...