Sciweavers

1548 search results - page 199 / 310
» Estimating Software Vulnerabilities
Sort
View
SAC
2009
ACM
15 years 6 months ago
Cross-organizational ERP management: how to create a successful business case?
This paper deals with the development and use of business cases in support of cross-organizational enterprise resource planning (ERP)-enabled e-business integration initiatives. I...
Silja Eckartz, Maya Daneva, Roel Wieringa, Jos van...
ISORC
2008
IEEE
15 years 5 months ago
Usability Aspects of WCET Analysis
Knowing the program timing characteristics is fundamental to the successful design and execution of real-time systems. A critical timing measure is the worst-case execution time (...
Jan Gustafsson
COMSWARE
2007
IEEE
15 years 5 months ago
A Relative Ad hoc Localization Scheme using Optical Wireless
Abstract— Scalable network localization is key for realizing ad-hoc networks. In this paper we propose a localization scheme where nodes form a relative coordinate system of the ...
Jayasri Akella, Murat Yuksel, Shivkumar Kalyanaram...
SIGIR
2006
ACM
15 years 5 months ago
Inferring document relevance via average precision
We consider the problem of evaluating retrieval systems using a limited number of relevance judgments. Recent work has demonstrated that one can accurately estimate average precis...
Javed A. Aslam, Emine Yilmaz
WORDS
2005
IEEE
15 years 5 months ago
Towards a Flow Analysis for Embedded System C Programs
Reliable program Worst-Case Execution Time (WCET) estimates are a key component when designing and verifying real-time systems. One way to derive such estimates is by static WCET ...
Jan Gustafsson, Andreas Ermedahl, Björn Lispe...