Sciweavers

630 search results - page 19 / 126
» The Future Is Not Assured - But It Should Be
Sort
View
HICSS
2005
IEEE
124views Biometrics» more  HICSS 2005»
15 years 7 months ago
Information Policy, Data Mining, and National Security: False Positives and Unidentified Negatives
Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generat...
Terrence A. Maxwell
MCS
2000
Springer
15 years 5 months ago
A Hybrid Projection Based and Radial Basis Function Architecture
We introduce a mechanism for constructing and training a hybrid architecture of projection based units and radial basis functions. In particular, we introduce an optimization sche...
Shimon Cohen, Nathan Intrator
ISIM
2007
15 years 3 months ago
Verification of Good Design Style of UML Models
Software architecture, and its behavior can be expressed as UML models. Models of complex systems can be also complex and hard to read – they may consists of hundreds of artifact...
Bogumila Hnatkowska
108
Voted
CASCON
2001
106views Education» more  CASCON 2001»
15 years 3 months ago
Using UML to reflect non-functional requirements
The way requirements should drive the rest of the software development process has been a subject of many research projects in the past. Unfortunately, all of them focus primarily...
Luiz Marcio Cysneiros, Julio Cesar Sampaio do Prad...
COOPIS
2002
IEEE
15 years 6 months ago
Empirical Differences between COTS Middleware Scheduling Strategies
The proportion of complex distributed real-time embedded (DRE) systems made up of commercial-off-the-shelf (COTS) hardware and software is increasing significantly in response to...
Christopher D. Gill, Fred Kuhns, Douglas C. Schmid...