Sciweavers

708 search results - page 80 / 142
» Observing the Materiality of Values in Information Systems R...
Sort
View
115
Voted
ICST
2010
IEEE
14 years 11 months ago
Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista
—Many factors are believed to increase the vulnerability of software system; for example, the more widely deployed or popular is a software system the more likely it is to be att...
Thomas Zimmermann, Nachiappan Nagappan, Laurie A. ...
125
Voted
CIKM
2009
Springer
14 years 10 months ago
Measuring system performance and topic discernment using generalized adaptive-weight mean
Standard approaches to evaluating and comparing information retrieval systems compute simple averages of performance statistics across individual topics to measure the overall sys...
Chung Tong Lee, Vishwa Vinay, Eduarda Mendes Rodri...
IDT
2008
123views more  IDT 2008»
15 years 20 days ago
A rich semantic model of track as a foundation for sharing beliefs regarding dynamic objects and events
: Many defense, homeland security, and commercial security objectives require continuous tracking of mobile entities such as aircraft. The systems that perform these functions prod...
Frederick Hayes-Roth, Curtis L. Blais
78
Voted
ICCS
2007
Springer
15 years 6 months ago
Dynamical Patterns in Scalefree Trees of Coupled 2D Chaotic Maps
New insights have been gained recently into the interplay between complex network architectures and the collective dynamics of simple elements coupled through them. The usual parad...
Zoran Levnajic, Bosiljka Tadic
97
Voted
HICSS
2003
IEEE
98views Biometrics» more  HICSS 2003»
15 years 6 months ago
Effectiveness and Applicability of Internet-Based Training in the Corporation - Case of Egypt
Learning is the most indispensable activity in the current knowledge-based economy where firms, in order to compete and survive, must be constantly alert, capable of adapting to f...
Mohamed Ibrahim