Sciweavers

1030 search results - page 33 / 206
» Happenings
Sort
View
ICC
2008
IEEE
122views Communications» more  ICC 2008»
15 years 5 months ago
Improving Quality of Experience by Adding Device Resource Reservation to Service Discovery Protocols
— Current service discovery protocols (SDP) hardly provide information on the actual availability of resources in the network or a mechanism for (device) resource reservation. Wh...
Archi Delphinanto, A. M. J. Koonen, Frank T. H. de...
ICPR
2008
IEEE
15 years 5 months ago
Fingerprint orientation analysis with topological modeling
This paper proposes to characterize the fingerprint orientation using a novel topological representation, which transforms the orientation field into a map composed of a set of ...
Zujun Hou, Jun Li, Hwee Keong Lam, Tai Pang Chen, ...
84
Voted
ISIP
2008
IEEE
15 years 5 months ago
An Approach Towards the Integration of Adaptive Business Intelligent and Constraint Programming
Adaptive Business Intelligence is the discipline that combines prediction, optimization and adaptability into a system answering two important questions: What would probably happe...
José Miguel Rubio, Broderick Crawford
AICCSA
2007
IEEE
120views Hardware» more  AICCSA 2007»
15 years 5 months ago
Using Maintainability Based Risk Assessment and Severity Analysis in Prioritizing Corrective Maintenance Tasks
:- A software product spends more than 65% of its lifecycle in maintenance. Software systems with good maintainability can be easily modified to fix faults. In this paper, we adapt...
Walid Abdelmoez, Katerina Goseva-Popstojanova, Han...
CSMR
2007
IEEE
15 years 5 months ago
How Clones are Maintained: An Empirical Study
Despite the conventional wisdom concerning the risks related to the use of source code cloning as a software development strategy, several studies appeared in literature indicated...
Lerina Aversano, Luigi Cerulo, Massimiliano Di Pen...