Sciweavers

136 search results - page 15 / 28
» Identifying Crosscutting Concerns Using Fan-in Analysis
Sort
View
ET
2007
67views more  ET 2007»
14 years 10 months ago
A Formal Analysis of Fault Diagnosis with D-matrices
As new approaches and algorithms are developed for system diagnosis, it is important to reflect on existing approaches to determine their strengths and weaknesses. Of concern is i...
John W. Sheppard, S. G. W. Butcher
HICSS
2007
IEEE
179views Biometrics» more  HICSS 2007»
15 years 4 months ago
Assessing User Acceptance of a Knowledge Management System in a Global Bank: Process Analysis and Concept Development
Many organizations pursue knowledge management (KM) initiatives, with different degrees of success. One key aspect of KM often neglected in practice is that it not only concerns t...
Cristof Bals, Stefan Smolnik, Gerold Riempp
CCS
2008
ACM
15 years 3 days ago
Spamalytics: an empirical analysis of spam marketing conversion
The "conversion rate" of spam -- the probability that an unsolicited e-mail will ultimately elicit a "sale" -- underlies the entire spam value proposition. How...
Chris Kanich, Christian Kreibich, Kirill Levchenko...
PUC
2010
84views more  PUC 2010»
14 years 8 months ago
Information privacy in institutional and end-user tracking and recording technologies
This paper presents an analysis of attitudes towards everyday tracking and recording technologies (e.g., credit cards, store loyalty cards, store video cameras). This work focuses ...
David H. Nguyen, Gillian R. Hayes
BMCBI
2010
147views more  BMCBI 2010»
14 years 10 months ago
CNstream: A method for the identification and genotyping of copy number polymorphisms using Illumina microarrays
Background: Understanding the genetic basis of disease risk in depth requires an exhaustive knowledge of the types of genetic variation. Very recently, Copy Number Variants (CNVs)...
Arnald Alonso, Antonio Julià, Raül Tor...