Sciweavers

1275 search results - page 171 / 255
» Are you having difficulty
Sort
View
FC
2009
Springer
92views Cryptology» more  FC 2009»
15 years 11 months ago
Deterring Online Advertising Fraud through Optimal Payment in Arrears
Online advertisers face substantial difficulty in selecting and supervising small advertising partners: Fraud can be well-hidden, and limited reputation systems reduce accountabili...
Benjamin Edelman
133
Voted
IAT
2008
IEEE
15 years 11 months ago
A Personalized Spam Filtering Approach Utilizing Two Separately Trained Filters
By feeding personal e-mails into the training set, personalized content-based spam filters are believed to classify e-mails in higher accuracy. However, filters trained by both sp...
Wei-Lun Teng, Wei-Chung Teng
ISPW
2008
IEEE
15 years 11 months ago
Benefits of Global Software Development: The Known and Unknown
Abstract. Organizations are increasingly moving to the global software development (GSD) model because of significant benefits that can accrue. However, GSD is fraught with difficu...
Pär J. Ågerfalk, Brian Fitzgerald, Hele...
AHS
2007
IEEE
252views Hardware» more  AHS 2007»
15 years 11 months ago
A Hybrid Engine for the Placement of Domain-Specific Reconfigurable Arrays
Rapid-prototyping of commercial devices and the demanding requirements for flexible hardware in mobile applications have driven the raise of reconfigurable hardware. The adaptatio...
Wing On Fung, Tughrul Arslan, Sami Khawam
MOMPES
2007
IEEE
15 years 11 months ago
Adopting Computational Independent Models for Derivation of Architectural Requirements of Software Product Lines
The alignment of the software architecture and the functional requirements of a system is a demanding task because of the difficulty in tracing design elements to requirements. Th...
Alexandre Bragança, Ricardo Jorge Machado