Sciweavers

1705 search results - page 223 / 341
» Introduction to recommender systems
Sort
View
ICSM
2003
IEEE
15 years 9 months ago
Source-Based Software Risk Assessment
The paper reports on a method for software risk assessments that takes into account “primary facts” and “secondary facts”. Primary facts are those obtained through automat...
Arie van Deursen, Tobias Kuipers
HICSS
2000
IEEE
139views Biometrics» more  HICSS 2000»
15 years 8 months ago
Capacity Payments and the Pricing of Reliability in Competitive Generation Markets
: In restructured electric power industries around the world, power pool designers have enabled generators to earn revenues consisting of energy and capacity payments. This paper d...
Angela S. Chuang, Felix F. Wu
UML
1999
Springer
15 years 8 months ago
Using the UML for Architectural Description
Abstract. There is much interest in using the Unified Modeling Language (UML) for architectural description – those techniques by which architects sketch, capture, model, docume...
Rich Hilliard
HICSS
1997
IEEE
110views Biometrics» more  HICSS 1997»
15 years 8 months ago
Enhancing Object-Oriented Modeling with Concepts to
This paper will present an approach that fosters a seamless integration of documents with corporate information systems. It is based on a conceptually enhanced notion of documents...
Ulrich Frank
ICNP
1997
IEEE
15 years 8 months ago
Dynamic host routing for production use of developmental networks
1 Many high-speed networks are in a development stage, compared to established technologies like Ethernet. Use of these networks for production service provides substantial benefit...
Joseph D. Touch, Theodore Faber