Sciweavers

2748 search results - page 379 / 550
» Generating Object-Z Specifications from Use Cases
Sort
View
CSDA
2006
96views more  CSDA 2006»
15 years 4 months ago
Analysis of new variable selection methods for discriminant analysis
Several methods to select variables that are subsequently used in discriminant analysis are proposed and analysed. The aim is to find from among a set of m variables a smaller sub...
Joaquín A. Pacheco, Silvia Casado, Laura N&...
ISF
2007
69views more  ISF 2007»
15 years 4 months ago
Assessing the UK policies for broadband adoption
Broadband technology has been introduced to the business community and the public as a rapid way of exploiting the Internet. The benefits of its use (fast reliable connections, an...
Jyoti Choudrie, Anastasia Papazafeiropoulou
120
Voted
JASIS
2007
119views more  JASIS 2007»
15 years 4 months ago
Visualization of the citation impact environments of scientific journals: An online mapping exercise
Aggregated journal-journal citation networks based on the Journal Citation Reports 2004 of the Science Citation Index (5968 journals) and the Social Science Citation Index (1712 j...
Loet Leydesdorff
105
Voted
AGIS
2000
54views more  AGIS 2000»
15 years 3 months ago
The Application of Earth Science Findings to the Practical Problems of Growing Winegrapes
Transforming science findings into practical applications is presented in the specific case of using remote sensing to detect the presence of an infestation of grapevines. The vin...
David L. Peterson, Lee F. Johnson
158
Voted
PVLDB
2010
117views more  PVLDB 2010»
15 years 2 months ago
Building Disclosure Risk Aware Query Optimizers for Relational Databases
Many DBMS products in the market provide built in encryption support to deal with the security concerns of the organizations. This solution is quite effective in preventing data ...
Mustafa Canim, Murat Kantarcioglu, Bijit Hore, Sha...