Sciweavers

672 search results - page 93 / 135
» Words and forbidden factors
Sort
View
ECIS
2004
13 years 10 months ago
Digital video recorder-driven impacts on the video content Services industry
Being part of a larger research program, this paper focuses on the impacts of so-called 'Digital Video Recorders' (DVRs) on the video content services industry. First, i...
Claudia Löbbecke
IASTEDSEA
2004
13 years 10 months ago
ARIES: Refactoring support environment based on code clone analysis
Code clone has been regarded as one of factors that make software maintenance more difficult. A code clone is a code fragment in a source code that is identical or similar to anot...
Yoshiki Higo, Toshihiro Kamiya, Shinji Kusumoto, K...
APPINF
2003
13 years 10 months ago
C-QM: A Practical Quality Model for Evaluating COTS Components
A commercial-off-the-shelf (COTS) component is an implementation of common functionality among family members, where an in-house component implements an organization-specific func...
Soo Dong Kim, Ji Hwan Park
ISSA
2004
13 years 10 months ago
Security Considerations In A Global Message Service Handler Design
: Web services are generally accepted as the most interoperable application interface today on the Web. In the context of a global electronic marketplace this is an essential facto...
Johannes J. van Eeden
ISASSCI
2001
13 years 10 months ago
Data Mining Architectures - A Comparative Study
Data mining is the process of deriving knowledge from data. The architecture of a data mining system plays a significant role in the efficiency with which data is mined. It is pro...
Thomas Thomas, Sanjeev Jayakumar, B. Muthukumaran