Sciweavers

1173 search results - page 179 / 235
» Identifying Successful Telecommuters
Sort
View
KI
2008
Springer
14 years 9 months ago
On Restaurants and Requirements: How Requirements Engineering may be Facilitated by Scripts
Requirements engineering is a central part of software projects. It is assumed that two third of all errors in software projects are caused by forgotten requirements or mutual misu...
Christoph Peylo
INTR
2007
120views more  INTR 2007»
14 years 9 months ago
Analysing Google rankings through search engine optimization data
Purpose – The purpose of this paper is to identify the most popular techniques used to rank a web page highly in Google. Design/methodology/approach – The paper presents the r...
Michael P. Evans
TCSV
2008
156views more  TCSV 2008»
14 years 9 months ago
Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication
Recently, among various data hiding techniques, a new subset, lossless data hiding, has received increasing interest. Most of the existing lossless data hiding algorithms are, howe...
Zhicheng Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qi...
BMCBI
2004
208views more  BMCBI 2004»
14 years 9 months ago
Hybrid clustering for microarray image analysis combining intensity and shape features
Background: Image analysis is the first crucial step to obtain reliable results from microarray experiments. First, areas in the image belonging to single spots have to be identif...
Jörg Rahnenführer, Daniel Bozinov
CN
1999
128views more  CN 1999»
14 years 9 months ago
Intrusion detection systems as evidence
: Although the main aim of IDSs is to detect intrusions to prompt evasive measures, a further aim can be to supply evidence in criminal and civil legal proceedings. However the fea...
Peter Sommer