Sciweavers

2562 search results - page 468 / 513
» Experience Management within Project Management Processes
Sort
View
ISF
2008
104views more  ISF 2008»
13 years 8 months ago
An integrative model of trust on IT outsourcing: Examining a bilateral perspective
Trust has been considered a central aspect of successful IT outsourcing from the beginning of the outsourcing relationship to the end. A great deal of interest in trust has been d...
Jae-Nam Lee, Minh Q. Huynh, Rudy Hirschheim
CCECE
2009
IEEE
13 years 6 months ago
The Australian Coastal Ocean radar Network facility
The Australian Coastal Ocean radar Network (ACORN) is a monitoring network of HF radars which are being installed around Australia under a National Collaborative Research Infrastr...
Malcolm L. Heron
LOCA
2009
Springer
14 years 3 months ago
LOCK: A Highly Accurate, Easy-to-Use Location-Based Access Control System
With proliferation of ubiquitous computing, digital access is facing an increasing risk since unauthorized client located at any place may intrude a local server. Location Based Ac...
Yongcai Wang, Junhui Zhao, Toshikazu Fukushima
ICDM
2008
IEEE
97views Data Mining» more  ICDM 2008»
14 years 3 months ago
Semi-supervised Learning from General Unlabeled Data
We consider the problem of Semi-supervised Learning (SSL) from general unlabeled data, which may contain irrelevant samples. Within the binary setting, our model manages to better...
Kaizhu Huang, Zenglin Xu, Irwin King, Michael R. L...
KBSE
2005
IEEE
14 years 2 months ago
Testing in resource constrained execution environments
Software for resource constrained embedded devices is often implemented in the Java programming language because the Java compiler and virtual machine provide enhanced safety, por...
Gregory M. Kapfhammer, Mary Lou Soffa, Daniel Moss...