Sciweavers

1580 search results - page 217 / 316
» Non-Interference Through Determinism
Sort
View
IVS
2006
240views more  IVS 2006»
13 years 10 months ago
Business process impact visualization and anomaly detection
Business operations involve many factors and relationships and are modeled as complex business process workflows. The execution of these business processes generates vast volumes ...
Ming C. Hao, Daniel A. Keim, Umeshwar Dayal, J&oum...
JSS
2008
94views more  JSS 2008»
13 years 10 months ago
Examining the significance of high-level programming features in source code author classification
The use of Source Code Author Profiles (SCAP) represents a new, highly accurate approach to source code authorship identification that is, unlike previous methods, language indepe...
Georgia Frantzeskou, Stephen G. MacDonell, Efstath...
DSS
2007
106views more  DSS 2007»
13 years 10 months ago
An investigation of factors that influence the duration of IT outsourcing relationships
Past studies in the IT outsourcing area have examined the management of IT outsourcing relationships from a variety of perspectives. The present paper extends this line of researc...
Jahyun Goo, Rajiv Kishore, Kichan Nam, H. Raghav R...
EJIS
2007
87views more  EJIS 2007»
13 years 10 months ago
Identifying healthcare actors involved in the adoption of information systems
The adoption of information systems in healthcare is no less significant than in any other commercial or caring organisation. The literature on IS adoption in healthcare, makes it...
Vasiliki Mantzana, Marinos Themistocleous, Zahir I...
JMLR
2006
136views more  JMLR 2006»
13 years 10 months ago
Optimising Kernel Parameters and Regularisation Coefficients for Non-linear Discriminant Analysis
In this paper we consider a novel Bayesian interpretation of Fisher's discriminant analysis. We relate Rayleigh's coefficient to a noise model that minimises a cost base...
Tonatiuh Peña Centeno, Neil D. Lawrence