Sciweavers

HICSS
2007
IEEE
89views Biometrics» more  HICSS 2007»
14 years 6 months ago
The Emergence of Standards: A Meta-Analysis
This paper provides a list of factors that influence the outcome of standard battles. We have developed this list by performing a meta-analysis of 103 papers. An extensive literat...
Geerten van de Kaa, Henk Jan de Vries, Eric van He...
HICSS
2007
IEEE
125views Biometrics» more  HICSS 2007»
14 years 6 months ago
Reconciling Manual and Automated Testing: The AutoTest Experience
Software can be tested either manually or automatically. The two approaches are complementary: automated testing can perform a large number of tests in little time, whereas manual...
Andreas Leitner, Ilinca Ciupa, Bertrand Meyer, Mar...
HICSS
2007
IEEE
97views Biometrics» more  HICSS 2007»
14 years 6 months ago
An Innovative Approach to Tackling the Boundary Effect in Adaptive Random Testing
Tsong Yueh Chen, Dehao Huang, T. H. Tse, Zongyuan ...
HICSS
2007
IEEE
124views Biometrics» more  HICSS 2007»
14 years 6 months ago
Building a Coordination Framework to Support Behavior-Based Adaptive Checkpointing for Open Distributed Embedded Systems
Checkpointing is a commonly used approach to provide fault-tolerance and improve system dependability. However, using a constant and preconfigured checkpointing frequency may comp...
Nianen Chen, Shangping Ren
HICSS
2007
IEEE
145views Biometrics» more  HICSS 2007»
14 years 6 months ago
Next-Generation Software Engineering: Function Extraction for Computation of Software Behavior
The ultra-large-scale systems of the future require the transformation of software engineering into a computational discipline capable of fast and dependable software development....
Richard C. Linger, Mark G. Pleszkoch, Luanne Burns...
HICSS
2007
IEEE
119views Biometrics» more  HICSS 2007»
14 years 6 months ago
Collection of U.S. Extremist Online Forums: A Web Mining Approach
Extremists’ exploitation of computer-mediated communications such as online forums has recently gained much attention from academia and the government. However, due to the cover...
Yilu Zhou, Jialun Qin, Guanpi Lai, Hsinchun Chen
HICSS
2007
IEEE
80views Biometrics» more  HICSS 2007»
14 years 6 months ago
Value Capture and Value Networks in Open Source Vendor Strategies
Firms involved in open source software face inherent limits on their ability to appropriate returns from technological innovation. Here I examine the business models used by IT ve...
Joel West
HICSS
2007
IEEE
139views Biometrics» more  HICSS 2007»
14 years 6 months ago
Ontology Driven CPG Authoring and Execution via a Semantic Web Framework
Clinical Practice Guidelines (CPG) are used by healthcare practitioners to standardize clinical practice and to provide evidence mediated health-care. Currently, there have been c...
Sajjad Hussain, Syed Sibte Raza Abidi