Sciweavers

1642 search results - page 78 / 329
» A Heuristic Method for Business Process Model Evaluation
Sort
View
ICDE
2005
IEEE
128views Database» more  ICDE 2005»
16 years 6 months ago
Exploiting Correlated Attributes in Acquisitional Query Processing
Sensor networks and other distributed information systems (such as the Web) must frequently access data that has a high per-attribute acquisition cost, in terms of energy, latency...
Amol Deshpande, Carlos Guestrin, Wei Hong, Samuel ...
XPU
2009
Springer
15 years 11 months ago
Is ISO/IEC 15504 Applicable to Agile Methods?
In the last two decades several models for evaluating software process capability have been defined and became more and more popular. The application of such models, and in particu...
Giuseppe Lami, Fabio Falcini
ICASSP
2008
IEEE
15 years 11 months ago
Evaluation of several strategies for single sensor speech/music separation
In this paper we address the application of single sensor source separation techniques to mixtures of speech and music. Three strategies for source modeling are presented, namely ...
Raphaël Blouet, Guy Rapaport, Cédric F...
BMCBI
2004
158views more  BMCBI 2004»
15 years 4 months ago
A novel Mixture Model Method for identification of differentially expressed genes from DNA microarray data
Background: The main goal in analyzing microarray data is to determine the genes that are differentially expressed across two types of tissue samples or samples obtained under two...
Kayvan Najarian, Maryam Zaheri, Ali Ajdari Rad, Si...
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 11 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard