Sciweavers

3370 search results - page 113 / 674
» Correlation Embedding Analysis
Sort
View
129
Voted
HICSS
2007
IEEE
116views Biometrics» more  HICSS 2007»
15 years 9 months ago
Modeling Network Decisions under Uncertainty: Countervailing Externalities and Embedded Options
The analysis of externalities in technology-based networks continues to be of significant managerial importance in e-commerce and traditional IS operations. Competitive strategy, ...
Robert J. Kauffman, Ajay Kumar
ISESE
2006
IEEE
15 years 8 months ago
An industrial case study of structural testing applied to safety-critical embedded software
Effective testing of safety-critical real-time embedded software is difficult and expensive. Many companies are hesitant about the cost of formalized criteria-based testing and a...
Jing Guan, Jeff Offutt, Paul Ammann
111
Voted
ICIP
2004
IEEE
16 years 4 months ago
The seamlessly multiplexed embedded codec (SMEC) and its application in image coding
The landmark JPEG 2000 image compression standard offers not only superior compression performance, but also incredible flexibility. The compressed bitstream of JPEG 2000 can be f...
Jin Li
CLEF
2004
Springer
15 years 8 months ago
How Do Named Entities Contribute to Retrieval Effectiveness?
Named entities in topics are a major factor contributing to the quality of retrieval results. In this paper, we report on an analysis on the correlation between the number of named...
Thomas Mandl, Christa Womser-Hacker
117
Voted
RTAS
2008
IEEE
15 years 9 months ago
Incorporating Resource Safety Verification to Executable Model-based Development for Embedded Systems
This paper formulates and illustrates the integration of resource safety verification into a design methodology for development of verified and robust real-time embedded systems. ...
Jianliang Yi, Honguk Woo, James C. Browne, Aloysiu...