Sciweavers

7865 search results - page 1437 / 1573
» Peer-to-Peer Data Management
Sort
View
CORR
2000
Springer
84views Education» more  CORR 2000»
14 years 9 months ago
Robust Classification for Imprecise Environments
In real-world environments it usually is difficult to specify target operating conditions precisely, for example, target misclassification costs. This uncertainty makes building ro...
Foster J. Provost, Tom Fawcett
ENTCS
2002
145views more  ENTCS 2002»
14 years 9 months ago
Combining Monitors for Runtime System Verification
Runtime verification permits checking system properties that cannot be fully verified off-line. This is particularly true when the system includes complex third-party components, ...
Joshua Levy, Hassen Saïdi, Tomás E. Ur...
ESE
2002
112views Database» more  ESE 2002»
14 years 9 months ago
An Empirical Method for Selecting Software Reliability Growth Models
Estimating remaining defects or failures in software can help test managers make release decisions during testing. Several methods exist to estimate defect content, among them a v...
Catherine Stringfellow, Anneliese Amschler Andrews
JIIS
2000
120views more  JIIS 2000»
14 years 9 months ago
Machine Learning for Intelligent Processing of Printed Documents
Abstract. A paper document processing system is an information system component which transforms information on printed or handwritten documents into a computer-revisable form. In ...
Floriana Esposito, Donato Malerba, Francesca A. Li...
CSUR
1998
99views more  CSUR 1998»
14 years 9 months ago
Multidimensional Access Methods
Search operations in databases require some special support at the physical level. This is true for conventional databases as well as for spatial databases, where typical search o...
Volker Gaede, Oliver Günther
« Prev « First page 1437 / 1573 Last » Next »