Sciweavers

4397 search results - page 690 / 880
» Relational Algebra Operations
Sort
View
HICSS
2002
IEEE
98views Biometrics» more  HICSS 2002»
15 years 8 months ago
Empirical Evidence of the Impacts of Electronic Commerce on Supply Chain Integration in the Telecommunication Equipment Industry
This paper presents an analysis of the impacts of electronic commerce on proactive firms in the connectivity equipment industry. Electronic commerce initiatives identified in the ...
Luc Cassivi, Louis A. Lefebvre, Pierre-Majorique L...
126
Voted
ICDM
2002
IEEE
108views Data Mining» more  ICDM 2002»
15 years 8 months ago
Mining Association Rules from Stars
Association rule mining is an important data mining problem. It is found to be useful for conventional relational data. However, previous work has mostly targeted on mining a sing...
Eric Ka Ka Ng, Ada Wai-Chee Fu, Ke Wang
124
Voted
ICSM
2002
IEEE
15 years 8 months ago
Maintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
Kanta Jiwnani, Marvin V. Zelkowitz
143
Voted
INFOCOM
2002
IEEE
15 years 8 months ago
Constraint-based path selection methods for on-demand provisioning in WDM networks
Abstract-- We propose a framework for decentralized path selection and on-demand wavelength channel provisioning in WDM networks with routing constraints. Within this framework, th...
Admela Jukan, Gerald Franzl
ISSRE
2002
IEEE
15 years 8 months ago
Mutation of Java Objects
Fault insertion based techniqueshave been used for measuring test adequacy and testability of programs. Mutation analysis inserts faults into a program with the goal of creating m...
Roger T. Alexander, James M. Bieman, Sudipto Ghosh...