Sciweavers

816 search results - page 18 / 164
» Challenges to Successful ERP Use
Sort
View
SERSCISA
2009
Springer
14 years 3 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim
MICCAI
2005
Springer
14 years 9 months ago
Model-Based Parameter Recovery from Uncalibrated Optical Images
We propose a novel method for quantitative interpretation of uncalibrated optical images which is derived explicitly from an analysis of the image formation model. Parameters chara...
Stephen J. Preece, I. B. Styles, S. D. Cotton, Ela...
ACL
2008
13 years 10 months ago
Kernels on Linguistic Structures for Answer Extraction
Natural Language Processing (NLP) for Information Retrieval has always been an interesting and challenging research area. Despite the high expectations, most of the results indica...
Alessandro Moschitti, Silvia Quarteroni
HICSS
2008
IEEE
134views Biometrics» more  HICSS 2008»
14 years 2 months ago
Simplified Use Case Driven Approach (SUCADA) for Conversion of Legacy System to COTS Package
The conversion of a legacy system to a system based on a commercial-off-the-shelf (COTS) package demands a dedicated guidance. The assumption that it is just a matter of adopting ...
Jose D. Montero, YongSeog Kim, Jeff Johnson
ADBIS
2003
Springer
127views Database» more  ADBIS 2003»
14 years 1 months ago
Using Common Schemas for Information Extraction from Heterogeneous Web Catalogs
The Web has become the world’s largest information source. Unfortunately, the main success factor of the Web, the inherent principle of distribution and autonomy of the participa...
Richard Vlach, Wassili Kazakos