Sciweavers

479 search results - page 84 / 96
» A quantified logic of evidence
Sort
View
SEKE
2004
Springer
14 years 1 months ago
Case Study Methodology Designed Research in Software Engineering Methodology Validation
One of the challenging research problems in validating a software engineering methodology (SEM), and a part of its validation process, is to answer “How to fairly collect, presen...
Seok Won Lee, David C. Rine
FPL
2003
Springer
164views Hardware» more  FPL 2003»
14 years 1 months ago
Fast, Large-Scale String Match for a 10Gbps FPGA-Based Network Intrusion Detection System
Intrusion Detection Systems such as Snort scan incoming packets for evidence of security threats. The most computation-intensive part of these systems is a text search against hund...
Ioannis Sourdis, Dionisios N. Pnevmatikatos
PODS
2000
ACM
146views Database» more  PODS 2000»
14 years 10 days ago
Analysis and Application of Adaptive Sampling
An estimation algorithm for a query is a probabilistic algorithm that computes an approximation for the size (number of tuples) of the query. One class of estimation algorithms us...
James F. Lynch
ASPDAC
1998
ACM
81views Hardware» more  ASPDAC 1998»
14 years 6 days ago
A Heuristic Algorithm to Design AND-OR-EXOR Three-Level Networks
—An AND-OR-EXOR network, where the output EXOR gate has only two inputs, is one of the simplest three-level architecture. This network realizes an EXOR of two sum-of-products exp...
Debatosh Debnath, Tsutomu Sasao
UIST
1998
ACM
14 years 6 days ago
Graphical Query Specification and Dynamic Result Previews for a Digital Library
Textual query languages based on Boolean logic are common amongst the search facilities of on-line information repositories. However, there is evidence to suggest that the syntact...
Steve Jones