Sciweavers

1386 search results - page 61 / 278
» Challenges to information systems: time to change
Sort
View
SACMAT
2004
ACM
14 years 2 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
CAISE
2009
Springer
14 years 3 months ago
Pattern Mining in System Logs: Opportunities for Process Improvement
Enterprise systems implementations are often accompanied by changes in the business processes of the organizations in which they take place. However, not all the changes are desira...
Dolev Mezebovsky, Pnina Soffer, Ilan Shimshoni
RAS
2006
111views more  RAS 2006»
13 years 8 months ago
Planning under uncertainty using model predictive control for information gathering
This paper considers trajectory planning problems for autonomous robots in information gathering tasks. The objective of the planning is to maximize the information gathered withi...
Cindy Leung, Shoudong Huang, Ngai Ming Kwok, Gamin...
DATE
2008
IEEE
110views Hardware» more  DATE 2008»
14 years 3 months ago
Run-time System for an Extensible Embedded Processor with Dynamic Instruction Set
One of the upcoming challenges in embedded processing is to incorporate an increasing amount of adaptivity in order to respond to the multifarious constraints induced by today’s...
Lars Bauer, Muhammad Shafique, Stephanie Kreutz, J...
ICSE
2012
IEEE-ACM
11 years 11 months ago
Where should the bugs be fixed? More accurate information retrieval-based bug localization based on bug reports
—For a large and evolving software system, the project team could receive a large number of bug reports. Locating the source code files that need to be changed in order to fix th...
Jian Zhou, Hongyu Zhang, David Lo