Sciweavers

1168 search results - page 140 / 234
» MCA Based Performance Evaluation of Project Selection
Sort
View
SUTC
2008
IEEE
15 years 11 months ago
Service-Oriented Design Methodology for Wireless Sensor Networks: A View through Case Studies
— In this paper we discuss the design methodology based on the service-oriented architecture and agile development principles for wireless embedded and sensor networks (WSNs). Th...
Elena Meshkova, Janne Riihijärvi, Frank Oldew...
ICSM
2009
IEEE
15 years 11 months ago
Scalable and incremental clone detection for evolving software
Code clone management has been shown to have several benefits for software developers. When source code evolves, clone management requires a mechanism to efficiently and increme...
Tung Thanh Nguyen, Hoan Anh Nguyen, Jafar M. Al-Ko...
152
Voted
GW
2005
Springer
242views Biometrics» more  GW 2005»
15 years 10 months ago
Finger Tracking Methods Using EyesWeb
This paper compares different algorithms for tracking the position of fingers in a two-dimensional environment. Four algorithms have been implemented in EyesWeb, developed by DIS...
Anne-Marie Burns, Barbara Mazzarino
SEC
2008
15 years 6 months ago
A Fuzzy Model for the Composition of Intrusion Detectors
The performance of an intrusion detector depends on several factors, like its internal architecture and the algorithms it uses. Thus, distinct detectors can behave distinctly when ...
Inez Raguenet, Carlos Maziero
CLEF
2010
Springer
15 years 5 months ago
Revamping Question Answering with a Semantic Approach over World Knowledge
Classic textual question answering (QA) approaches that rely on statistical keyword relevance scoring without exploiting semantic content are useful to a certain extent, but are li...
Nuno Cardoso, Iustin Dornescu, Sven Hartrumpf, Joh...