Sciweavers

3747 search results - page 279 / 750
» Active Operations on Collections
Sort
View
ER
2004
Springer
96views Database» more  ER 2004»
14 years 3 months ago
Risk-Driven Conceptual Modeling of Outsourcing Decisions
Abstract. In the current networked world, outsourcing of information technology or even of entire business processes is often a prominent design alternative. In the general case, o...
Pascal van Eck, Roel Wieringa, Jaap Gordijn
ICBA
2004
Springer
180views Biometrics» more  ICBA 2004»
14 years 3 months ago
FVC2004: Third Fingerprint Verification Competition
A new technology evaluation of fingerprint verification algorithms has been organized following the approach of the previous FVC2000 and FVC2002 evaluations, with the aim of tracki...
Dario Maio, Davide Maltoni, Raffaele Cappelli, Jam...
KBSE
2003
IEEE
14 years 2 months ago
The Feature Signatures of Evolving Programs
As programs evolve, their code increasingly becomes tangled by programmers and requirements. This mosaic quality complicates program comprehension and maintenance. Many of these a...
Daniel R. Licata, Christopher D. Harris, Shriram K...
DBISP2P
2003
Springer
76views Database» more  DBISP2P 2003»
14 years 2 months ago
Trust-Aware Delivery of Composite Goods
Abstract. The vast majority of the interactions in typical online communities nowadays is between complete strangers. In such settings reputation reporting and trust management mod...
Magdalena Punceva, Karl Aberer
HUC
2003
Springer
14 years 2 months ago
Tools for Studying Behavior and Technology in Natural Settings
Abstract. Three tools for acquiring data about people, their behavior, and their use of technology in natural settings are described: (1) a context-aware experience sampling tool, ...
Stephen S. Intille, Emmanuel Munguia Tapia, John R...