Sciweavers

2384 search results - page 307 / 477
» Analyzing Requirements Engineering Processes: A Case Study
Sort
View
ENTCS
2010
75views more  ENTCS 2010»
15 years 4 months ago
Semi-Automatic Specification of Behavioural Service Adaptation Contracts
An adaptation contract describes composition constraints and adaptation requirements among several services which were not initially built to interoperate with each other. The man...
Javier Cámara, José Antonio Mart&iac...
KBSE
2005
IEEE
15 years 10 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
INCDM
2009
Springer
96views Data Mining» more  INCDM 2009»
15 years 11 months ago
Ordinal Evaluation: A New Perspective on Country Images
We present a novel use of ordinal evaluation (OrdEval) algorithm as a promising technique to study various marketing phenomena. OrdEval algorithm has originated in data mining and ...
Marko Robnik-Sikonja, Kris Brijs, Koen Vanhoof
MAGS
2010
153views more  MAGS 2010»
14 years 11 months ago
Designing bidding strategies in sequential auctions for risk averse agents
Designing efficient bidding strategies for sequential auctions remains an important, open problem area in agent-mediated electronic markets. In existing literature, a variety of bi...
Valentin Robu, Han La Poutré
JSAC
2007
117views more  JSAC 2007»
15 years 4 months ago
Spectrum sharing for unlicensed bands
We study a spectrum sharing problem in an unlicensed band where multiple systems coexist and interfere with each other. Due to asymmetries and selfish system behavior, unfair and...
Raul Etkin, Abhay Parekh, David Tse