Sciweavers

16190 search results - page 3032 / 3238
» Applicative programming with effects
Sort
View
FOCS
2005
IEEE
14 years 4 months ago
How to Pay, Come What May: Approximation Algorithms for Demand-Robust Covering Problems
Robust optimization has traditionally focused on uncertainty in data and costs in optimization problems to formulate models whose solutions will be optimal in the worstcase among ...
Kedar Dhamdhere, Vineet Goyal, R. Ravi, Mohit Sing...
HICSS
2005
IEEE
125views Biometrics» more  HICSS 2005»
14 years 4 months ago
Taking Topic Detection From Evaluation to Practice
Abstract— The Topic Detection and Tracking (TDT) research community investigates information retrieval methods for organizing a constantly arriving stream of news articles by the...
James Allan, Stephen M. Harding, David Fisher, Alv...
ICDCSW
2005
IEEE
14 years 4 months ago
DiamondHelp: A Collaborative Interface Framework for Networked Home Appliances
DiamondHelp is a reusable Java framework for building graphical user interfaces based on the collaborative paradigm of human-computer interaction. DiamondHelp´s graphical design ...
Charles Rich, Candy L. Sidner, Neal Lesh, Andrew G...
IWPSE
2005
IEEE
14 years 4 months ago
EvoLens: Lens-View Visualizations of Evolution Data
Visualizing software evolution is essential for identifying design erosions that have occurred over the past releases. Making evolutionary aspects explicit via visual representati...
Jacek Ratzinger, Michael Fischer, Harald Gall
KBSE
2005
IEEE
14 years 4 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
« Prev « First page 3032 / 3238 Last » Next »