Sciweavers

536 search results - page 47 / 108
» Quality evaluation in information systems outsourcing
Sort
View
COSIT
2005
Springer
95views GIS» more  COSIT 2005»
14 years 2 months ago
Simulation of Obfuscation and Negotiation for Location Privacy
Abstract. Current mobile computing systems can automatically sense and communicate detailed data about a person’s location. Location privacy is an urgent research issue because c...
Matt Duckham, Lars Kulik
GECCO
2003
Springer
182views Optimization» more  GECCO 2003»
14 years 1 months ago
Modeling the Search Landscape of Metaheuristic Software Clustering Algorithms
Abstract. Software clustering techniques are useful for extracting architectural information about a system directly from its source code structure. This paper starts by examining ...
Brian S. Mitchell, Spiros Mancoridis
TMC
2011
1105views more  TMC 2011»
13 years 3 months ago
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
—Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals. To this end, we propose a privacy-preserving location monit...
Chi-Yin Chow, Mohamed F. Mokbel, Tian He
SEKE
2005
Springer
14 years 2 months ago
Javawock: A Java Class Recommender System Based on Collaborative Filtering
- Many software development platforms provide a large number of library components to make it easy to build high quality software. On the other hand, it became more and more diffic...
Masateru Tsunoda, Takeshi Kakimoto, Naoki Ohsugi, ...
CISS
2007
IEEE
14 years 2 months ago
On Capacity of Automatic Target Recognition Systems Under the Constraint of PCA-Encoding
Limiting capabilities of practical recognition systems are determined by a variety of factors that include source encoding techniques, quality of images, complexity of underlying ...
Xiaohan Chen, Natalia A. Schmid