Sciweavers

4923 search results - page 864 / 985
» Software Risk Management
Sort
View
DGO
2007
134views Education» more  DGO 2007»
13 years 10 months ago
Control patterns in a healthcare network
To keep a network of enterprises sustainable, inter-organizational control measures are needed to detect or prevent opportunistic behaviour of network participants. We present a m...
Vera Kartseva, Joris Hulstijn, Jaap Gordijn, Yao-H...
LREC
2010
131views Education» more  LREC 2010»
13 years 10 months ago
An Evolving eScience Environment for Research Data in Linguistics
The amount of research data in the Humanities is increasing at fast speed. Metadata helps describing and making accessible this data to interested researchers within and across in...
Claus Zinn, Peter Wittenburg, Jacquelijn Ringersma
LREC
2010
171views Education» more  LREC 2010»
13 years 10 months ago
LAT Bridge: Bridging Tools for Annotation and Exploration of Rich Linguistic Data
We present a software module, the LAT Bridge, which enables bidirectional communication between the annotation and exploration tools developed at the Max Planck Institute for Psyc...
Marc Kemps-Snijders, Thomas Koller, Han Sloetjes, ...
ERSA
2008
118views Hardware» more  ERSA 2008»
13 years 10 months ago
A Framework to Improve IP Portability on Reconfigurable Computers
- This paper presents a framework that improves the portability and ease-of-use issues of current Reconfigurable Computers (RCs). These two drawbacks should be solved in order for ...
Miaoqing Huang, Ivan Gonzalez, Sergio López...
ICAI
2008
13 years 10 months ago
Online Boosting Based Intrusion Detection in Changing Environments
Intrusion detection is an active research field in the development of reliable web-based information systems, where many artificial intelligence techniques are exploited to fit th...
Yanguo Wang, Weiming Hu, Xiaoqin Zhang