Sciweavers

3193 search results - page 567 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
IJMMS
2006
171views more  IJMMS 2006»
13 years 9 months ago
The role of moderating factors in user technology acceptance
Along with increasing investments in new technologies, user technology acceptance becomes a frequently studied topic in the information systems discipline. The last two decades ha...
Heshan Sun, Ping Zhang 0002
APSEC
2003
IEEE
14 years 2 months ago
Understanding How the Requirements Are Implemented in Source Code
For software maintenance and evolution, a common problem is to understand how each requirement is implemented in the source code. The basic solution of this problem is to find the...
Wei Zhao, Lu Zhang, Yin Liu, Jing Luo, Jiasu Sun
SDM
2010
SIAM
146views Data Mining» more  SDM 2010»
13 years 10 months ago
Towards Finding Valuable Topics
Enterprises depend on their information workers finding valuable information to be productive. However, existing enterprise search and recommendation systems can exploit few studi...
Zhen Wen, Ching-Yung Lin
CVPR
2004
IEEE
14 years 11 months ago
The World in an Eye
This paper provides a comprehensive analysis of exactly what visual information about the world is embedded within a single image of an eye. It turns out that the cornea of an eye...
Ko Nishino, Shree K. Nayar
KBSE
2005
IEEE
14 years 2 months ago
Determining the cost-quality trade-off for automated software traceability
Major software development standards mandate the establishment of trace links among software artifacts such as requirements, architectural elements, or source code without explici...
Alexander Egyed, Stefan Biffl, Matthias Heindl, Pa...