Sciweavers

1022 search results - page 150 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
ISCAPDCS
2004
13 years 10 months ago
Detecting Grid-Abuse Attacks by Source-based Monitoring
While it provides the unprecedented processing power to solve many large scale computational problems, GRID, if abused, has the potential to easily be used to launch (for instance...
Jianjia Wu, Dan Cheng, Wei Zhao
INFORMATICALT
2007
171views more  INFORMATICALT 2007»
13 years 9 months ago
E-Learning Documentation of Historical Living Systems with 3-D Modeling Functionality
The innovations and improvements in digital imaging sensors and scanners, computer modeling, haptic equipments and e-learning technology, as well as the availability of many powerf...
Athanasios D. Styliadis
ICIP
2005
IEEE
14 years 10 months ago
Automatic classification of breast density
A recent trend in digital mammography are Computer-Aided Diagnosis systems, which are computerised tools designed to assist radiologists. Most of these systems are used for the au...
Arnau Oliver, Jordi Freixenet, Reyer Zwiggelaar
HICSS
2005
IEEE
159views Biometrics» more  HICSS 2005»
14 years 2 months ago
A Repeatable Collaboration Process for Usability Testing
Evaluating the usability of an application is a crucial activity in systems development projects. It is often done collaboratively, involving groups of current or future users, us...
Gert-Jan de Vreede, Ann L. Fruhling, Anita Chakrap...
CSMR
2009
IEEE
14 years 3 months ago
Identification of Extract Method Refactoring Opportunities
Extract Method has been recognized as one of the most important refactorings, since it decomposes large methods and can be used in combination with other refactorings for fixing a...
Nikolaos Tsantalis, Alexander Chatzigeorgiou