Sciweavers

3555 search results - page 152 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
170
Voted
HICSS
2009
IEEE
165views Biometrics» more  HICSS 2009»
15 years 10 months ago
Studying Knowledge Management System Success in System Administration
Significant temporal and monetary costs are associated with the development and implementation of a knowledge management system (KMS). To justify this investment, it is important ...
Nicole F. Velasquez, Alexandra Durcikova, Rajiv Sa...
120
Voted
EWCBR
2006
Springer
15 years 7 months ago
What Evaluation Criteria Are Right for CCBR? Considering Rank Quality
Abstract. Evaluation criteria for conversational CBR (CCBR) systems are important to guide development and tuning of new methods, and to enable practitioners to make informed decis...
Steven Bogaerts, David B. Leake
154
Voted
PPPJ
2006
ACM
15 years 9 months ago
The Project Maxwell assembler system
The JavaTM programming language is primarily used for platform-independent programming. Yet it also offers many productivity, maintainability and performance benefits for platfo...
Bernd Mathiske, Douglas N. Simon, Dave Ungar
143
Voted
APSEC
2006
IEEE
15 years 9 months ago
Visualizing Clone Cohesion and Coupling
Coupling and cohesion between subsystems are commonly studied metrics when analyzing the architecture of software systems. It is usually desirable for subsystems to have high cohe...
Zhen Ming Jiang, Ahmed E. Hassan, Richard C. Holt
139
Voted
SPRINGSIM
2010
15 years 2 months ago
Advanced IDE for modeling and simulation of discrete event systems
: Creating models and analyzing simulation results can be a difficult and time-consuming task, especially for non-experienced users. Although several DEVS simulators have been deve...
Matías Bonaventura, Gabriel A. Wainer, Rodr...