The summarization technologies have been increasingly used in recent decades. Those technologies are a very important part of emerging topics in computerscience and engineering, such that Natural Language Processing ...
详细信息
In the process of delivery usually the baby comes out of the vagina but under some circumstances a cesarean section is performed. Caesarean section, on the one hand can have short-term and long-term effects for the mo...
详细信息
The data mining process requires a data set that can be used in determining a number of specific patterns to gain new knowledge. Large data sets (Big data) require special methods to get effective results. Included in...
详细信息
The management of distributed software development projects presents many challenges. One of them happens right at the start of the project and consists of the allocation of tasks between remote teams. When allocating...
详细信息
ISBN:
(纸本)189170639X
The management of distributed software development projects presents many challenges. One of them happens right at the start of the project and consists of the allocation of tasks between remote teams. When allocating a task to a site, the project manager takes into account several factors such as technical knowledge of staff and proximity to the client. The project manager usually takes this decision in a subjective way. The verbal decision analysis is an approach based on solving problems through multi-criteria qualitative analysis, which means it considers the analysis of subjective criteria. This paper describes the application of verbal decision analysis methodologies ORCLASS and ZAPROS III-i to classify and rank the most relevant factors that the project managers should take into account when allocating tasks in projects of distributed development of software.
Data mining is an analytical process of knowledge discovery in large and complex data sets. Many studies wish to explore data, to find information so that knowledge can be obtained through the grouping process, classi...
详细信息
Access point (AP) security has become increasingly important as wireless local area networks (WLANs) proliferate in industrial environments. Rogue APs are often used by attackers to conduct man-in-the-middle (MiTM) at...
详细信息
Over the past few years, several highly accurate Machine Learning (ML) techniques have been proposed for Android malware detection. Unfortunately, proposed schemes are rarely used in production, a situation usually ca...
详细信息
This paper is concerned with the risks associated with the software development process. A model (GRisk-Modeo is proposed for the management of such risks and a software tool (GRisk-Tool), developed to support the mod...
详细信息
ISBN:
(纸本)0387393870
This paper is concerned with the risks associated with the software development process. A model (GRisk-Modeo is proposed for the management of such risks and a software tool (GRisk-Tool), developed to support the model, is described. Both the method and the tool were created with the participation of senior managers and software engineers of software factories. The model and the tool serve as effective instruments for achieving the continuous improvement of software processes and products.
The Cooperative Multi-Robot Observation of Multiple Moving Targets (CMOMMT) considers two types of robots, observers and targets, in a partially observable 2D environment, in which the task of the observers is to moni...
详细信息
Palm vein pattern recognition offers a unique personal identification feature. Unfortunately, these techniques typically require a Near Infrared (NIR) camera sensor to extract the individual's venous pattern, chal...
详细信息
暂无评论