Sciweavers

3511 search results - page 194 / 703
» Evaluation Methods for Groupware Systems
Sort
View
CDC
2009
IEEE
15 years 9 months ago
Linear control of time-domain constrained systems
— Recent results on the control of linear systems subject to time-domain constraints could only handle the case of closed-loop poles that are situated on the real axis. As most c...
Wouter H. T. M. Aangenent, W. P. M. H. Heemels, M....
USENIX
2003
15 years 5 months ago
NCryptfs: A Secure and Convenient Cryptographic File System
Often, increased security comes at the expense of user convenience, performance, or compatibility with other systems. The right level of security depends on specific site and use...
Charles P. Wright, Michael C. Martino, Erez Zadok
VISSOFT
2005
IEEE
15 years 10 months ago
Exploring Relations within Software Systems Using Treemap Enhanced Hierarchical Graphs
The clear and meaningful visualization of relations between software entities is an invaluable tool for the comprehension, evaluation, and reengineering of the structure of existi...
Michael Balzer, Oliver Deussen
MMM
2006
Springer
133views Multimedia» more  MMM 2006»
15 years 10 months ago
A SVM-based personal recommendation system for TV programs
This paper presents a SVM-based prediction approach for constructing personal recommendation system for TV programs. We have applied Support Vector Machine (SVM) to personal predi...
Jin An Xu, Kenji Araki
SSS
2009
Springer
128views Control Systems» more  SSS 2009»
15 years 9 months ago
Dependability Engineering of Silent Self-stabilizing Systems
Self-stabilization is an elegant way of realizing non-masking fault-tolerant systems. Sustained research over last decades has produced multiple self-stabilizing algorithms for man...
Abhishek Dhama, Oliver E. Theel, Pepijn Crouzen, H...