Sciweavers

1441 search results - page 89 / 289
» A Practical Approach to Network-Based Processing
Sort
View
AGILEDC
2003
IEEE
15 years 7 months ago
Iteration Advocate/Iteration Transition Meeting: Small Sampling of New agile Techniques Used at a Major Telecommunications Firm
This paper documents a successful implementation of agile at a major telecommunications firm. Critical aspects to mention about this particular software endeavor include a) this c...
Brian S. Boelsterli
IJCAI
2003
15 years 3 months ago
Backdoors To Typical Case Complexity
There has been significant recent progress in reasoning and constraint processing methods. In areas such as planning and finite model-checking, current solution techniques can h...
Ryan Williams, Carla P. Gomes, Bart Selman
IEEEIAS
2009
IEEE
15 years 9 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
GI
2007
Springer
15 years 8 months ago
Dealing with Knowledge Intensive Services in E-Government. A Case Study
Abstract: Governmental processes are complex and knowledge-intensive. Most process management systems fail to support them in an adequate way. On the other hand semantic technologi...
Daniela Feldkamp, Knut Hinkelmann, Holger Wache
ESE
2008
88views Database» more  ESE 2008»
15 years 2 months ago
Cooperative method development
The development of methods tools and process improvements is best to be based on the understanding of the development practice to be supported. Qualitative research has been propo...
Yvonne Dittrich, Kari Rönkkö, Jeanette E...