Sciweavers

634 search results - page 101 / 127
» On the history of evaluation in IR
Sort
View
CSUR
2008
351views more  CSUR 2008»
13 years 8 months ago
Process-centered review of object oriented software development methodologies
on the methodologies and processes, but instead provide an abstract and structured description in a way that facilitates their elaborate analysis for the purposes of improving unde...
Raman Ramsin, Richard F. Paige
EAAI
2006
75views more  EAAI 2006»
13 years 7 months ago
Multi-agent framework based on smart sensors/actuators for machine tools control and monitoring
Throughout the history, the evolutions of the requirements for manufacturing equipments have depended on the changes in the customers' demands. Among the present trends in th...
Xavier Desforges, Bernard Archimède
IJWET
2008
108views more  IJWET 2008»
13 years 7 months ago
Web service workflow selection using system and network QoS constraints
: Web services serve as a leading technology platform for web-based data-centric environments providing flexibility of loose coupling, message-based communication. Interest in more...
Yannis Panagis, Konstantinos Papakonstantinou, Eva...
IVS
2008
139views more  IVS 2008»
13 years 7 months ago
DataMeadow: a visual canvas for analysis of large-scale multivariate data
Supporting visual analytics of multiple large-scale multidimensional datasets requires a high degree of interactivity and user control beyond the conventional challenges of visual...
Niklas Elmqvist, John T. Stasko, Philippas Tsigas
ISI
2006
Springer
13 years 7 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu