Sciweavers

2421 search results - page 94 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
184
Voted
PROMISE
2010
14 years 10 months ago
Prediction of defect distribution based on project characteristics for proactive project management
As software has been pervasive and various software projects have been executed since the 1970s, software project management has played a significant role in software industry. Th...
Youngki Hong, Wondae Kim, Jeongsoo Joo
CGF
2008
126views more  CGF 2008»
15 years 3 months ago
Results of a User Study on 2D Hurricane Visualization
We present the results from a user study looking at the ability of observers to mentally integrate wind direction and magnitude over a vector field. The data set chosen for the st...
Joel P. Martin, J. Edward Swan II, Robert J. Moorh...
140
Voted
CBMS
2007
IEEE
15 years 10 months ago
A Large Scale Data Mining Approach to Antibiotic Resistance Surveillance
One of the most considerable functions in a hospital's infection control program is the surveillance of antibiotic resistance. Several traditional methods used to measure it ...
Eugenia G. Giannopoulou, Vasileios P. Kemerlis, Mi...
154
Voted
AP2PC
2004
Springer
15 years 9 months ago
Peer-to-Peer Semantic Integration of XML and RDF Data Sources
Abstract. Peer-to-Peer (P2P) data management systems combine traditional schema-based integration techniques with the P2P infrastructure. In this paper, we propose a P2P data manag...
Isabel F. Cruz, Huiyong Xiao, Feihong Hsu
131
Voted
IEEEARES
2006
IEEE
15 years 9 months ago
Towards a Stochastic Model for Integrated Security and Dependability Evaluation
We present a new approach to integrated security and dependability evaluation, which is based on stochastic modelling techniques. Our proposal aims to provide operational measures...
Karin Sallhammar, Bjarne E. Helvik, Svein J. Knaps...