Sciweavers

960 search results - page 75 / 192
» There's no Data like More Data
Sort
View
CSE
2009
IEEE
14 years 3 months ago
Probabilistic Generative Models of the Social Annotation Process
—With the growth in the past few years of social tagging services like Delicious and CiteULike, there is growing interest in modeling and mining these social systems for deriving...
Said Kashoob, James Caverlee, Elham Khabiri
SECURWARE
2008
IEEE
14 years 3 months ago
Analysis of Computer Infection Risk Factors Based on Customer Network Usage
— Epidemiology, the science that studies the cause and propagation of diseases, provides us with the concepts and methods to analyze the potential risk factors to which ADSL cust...
Yannick Carlinet, Ludovic Mé, Hervé ...
ICSEA
2007
IEEE
14 years 3 months ago
Design and Development Tools for Next Generation Mobile Services
The actual standards for service authoring, composition and development are not easy to port and to apply for next generation mobile applications. This paper describes some tools ...
Giovanni Bartolomeo, Casalicchio Casalicchio, Stef...
FORMATS
2007
Springer
14 years 3 months ago
Hypervolume Approximation in Timed Automata Model Checking
Dierence Bound Matrices (DBMs) are the most commonly used data structure for model checking timed automata. Since long they are being used in successful tools like Kronos or UPPAA...
Víctor A. Braberman, Jorge Lucángeli...
SAFECOMP
2007
Springer
14 years 3 months ago
Software Encoded Processing: Building Dependable Systems with Commodity Hardware
In future, the decreasing feature size and the reduced power supply will make it much more difficult to built reliable microprocessors. Economic pressure will most likely result in...
Ute Wappler, Christof Fetzer