Sciweavers

208 search results - page 32 / 42
» An Empirically-Based Process to Improve the Practice of Requ...
Sort
View
CCS
2004
ACM
14 years 24 days ago
Operational experiences with high-volume network intrusion detection
In large-scale environments, network intrusion detection systems (NIDSs) face extreme challenges with respect to traffic volume, traffic diversity, and resource management. Whil...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
ESEM
2008
ACM
13 years 9 months ago
Phase distribution of software development effort
Effort distribution by phase or activity is an important but often overlooked aspect compared to other steps in the cost estimation process. Poor effort allocation is among the ma...
Ye Yang, Mei He, Mingshu Li, Qing Wang, Barry W. B...
ICASSP
2010
IEEE
13 years 7 months ago
Search-Based Automatic Image Annotation via Flickr Photos Using Tag Expansion
Exponentially growing photo collections motivate the needs for automatic image annotation for effective manipulations (e.g., search, browsing). Most of the prior works rely on sup...
Liang-Chi Hsieh, Winston H. Hsu
IR
2008
13 years 7 months ago
A compressed self-index using a Ziv-Lempel dictionary
A compressed full-text self-index for a text T , of size u, is a data structure used to search for patterns P, of size m, in T , that requires reduced space, i.e. space that depend...
Luís M. S. Russo, Arlindo L. Oliveira
ICASSP
2011
IEEE
12 years 11 months ago
Comparison of several covariance matrix estimators for portfolio optimization
Modern portfolio theory dates back to a seminal 1952 paper by H. Markowitz and has been very influential both in academic finance and among practitioners in the financial indus...
Ka Ki Ng, Priyanka Agarwal, Nathan Mullen, Dzung D...