Sciweavers

7134 search results - page 1287 / 1427
» A comparative study of map use
Sort
View
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
14 years 3 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
JCDL
2010
ACM
199views Education» more  JCDL 2010»
14 years 3 months ago
Crowdsourcing the assembly of concept hierarchies
The“wisdom of crowds”is accomplishing tasks that are cumbersome for individuals yet cannot be fully automated by means of specialized computer algorithms. One such task is the...
Kai Eckert, Mathias Niepert, Christof Niemann, Cam...
KBSE
2000
IEEE
14 years 2 months ago
A Comparison of Questionnaire-Based and GUI-Based Requirements Gathering
: Software development includes gathering information about tasks, work practices and design options from users. Traditionally requirements gathering takes two forms. Interviews an...
J. Michael Moore, Frank M. Shipman III
CODES
2004
IEEE
14 years 2 months ago
Power analysis of system-level on-chip communication architectures
For complex System-on-chips (SoCs) fabricated in nanometer technologies, the system-level on-chip communication architecture is emerging as a significant source of power consumpti...
Kanishka Lahiri, Anand Raghunathan
ATAL
2006
Springer
14 years 2 months ago
A Comparison of Sequential and Simultaneous Auctions
Sequential and simultaneous auctions are two important mechanisms for buying/selling multiple objects. These two mechanisms yield different outcomes (i.e., different revenues and a...
S. Shaheen Fatima
« Prev « First page 1287 / 1427 Last » Next »