Sciweavers

19003 search results - page 185 / 3801
» We Need Assurance!
Sort
View
PAKDD
2004
ACM
137views Data Mining» more  PAKDD 2004»
14 years 3 months ago
Fast and Light Boosting for Adaptive Mining of Data Streams
Supporting continuous mining queries on data streams requires algorithms that (i) are fast, (ii) make light demands on memory resources, and (iii) are easily to adapt to concept dr...
Fang Chu, Carlo Zaniolo
HICSS
2003
IEEE
129views Biometrics» more  HICSS 2003»
14 years 3 months ago
The Transitional Role of Institutional Trust in Online Interorganizational Relationships
Given the uncertainty of the online environment, institutional trust is fundamental in building and retaining online interorganizational relationships. The authors propose two typ...
Paul A. Pavlou, Yao-Hua Tan, David Gefen
LCN
2003
IEEE
14 years 3 months ago
Best-Effort Low-Delay Service
The Differentiated Services (DiffServ) approach is intended to provide Quality of Service (QoS) in IP-based networks. This is a very important issue not only in wire-line fixed n...
Jörg Diederich, Mark Doll, Martina Zitterbart
WCRE
2003
IEEE
14 years 3 months ago
Problems Creating Task-relevant Clone Detection Reference Data
One prevalent method for evaluating the results of automated software analysis tools is to compare the tools’ output to the judgment of human experts. This evaluation strategy i...
Andrew Walenstein, Nitin Jyoti, Junwei Li, Yun Yan...
ICSE
2003
IEEE-ACM
14 years 3 months ago
Achieving Critical System Survivability Through Software Architectures
Software-intensive systems often exhibit dimensions in size and complexity that exceed the scope of comprehension of even talented, experienced system designers and analysts. With ...
John C. Knight, Elisabeth A. Strunk