Sciweavers

806 search results - page 87 / 162
» A Practitioners
Sort
View
IEEEIAS
2007
IEEE
14 years 5 months ago
Cyber Threat Trend Analysis Model Using HMM
Prevention, not reaction, is normally recognized as one of the best defense strategy against malicious hackers or attackers. The desire of deploying better prevention mechanism mo...
Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Pet...
ITNG
2007
IEEE
14 years 5 months ago
SEQUENCE PACKAGE ANALYSIS: A New Natural Language Understanding Method for Intelligent Mining of Recordings of Doctor-Patient In
Medical histories provide a rich resource for diagnoses and treatment. Similarly, consumers’ blog postings on health-related topics offer unique data for medical researchers, pr...
Amy Neustein
IWPC
2007
IEEE
14 years 5 months ago
Empirical Evaluation of a UML Sequence Diagram with Adornments to Support Understanding of Thread Interactions
Programs that use multi-threaded concurrency are known to be difficult to design. Moreover, research in computer-science education suggests that concurrency and synchronization co...
Shaohua Xie, Eileen Kraemer, R. E. Kurt Stirewalt
AI
2007
Springer
14 years 5 months ago
Adding Local Constraints to Bayesian Networks
When using Bayesian networks, practitioners often express constraints among variables by conditioning a common child node to induce the desired distribution. For example, an ‘orâ...
Mark Crowley, Brent Boerlage, David Poole
FASE
2007
Springer
14 years 5 months ago
Flexible and Extensible Notations for Modeling Languages
Abstract. In model-based development, a formal description of the software (the model) is the central artifact that drives other development activities. The availability of a model...
Jimin Gao, Mats Per Erik Heimdahl, Eric Van Wyk