Sciweavers

43264 search results - page 139 / 8653
» Comparing models of computation
Sort
View
CHI
2007
ACM
14 years 28 days ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
APCHI
2004
IEEE
14 years 21 days ago
NetWorker: A Practical Web-Based Tool to Support the Collect-Compare-Choose Cycle
An earlier paper has covered the development of a paper prototype of NetWorker, a tool designed to facilitate a Web usage referred to as the Collect-Compare-Choose cycle. Here we d...
Paul J. Lyons, Chris Phillips, Elizabeth A. Kemp, ...
AAAI
2008
13 years 11 months ago
From Comparing Clusterings to Combining Clusterings
This paper presents a fast simulated annealing framework for combining multiple clusterings (i.e. clustering ensemble) based on some measures of agreement between partitions, whic...
Zhiwu Lu, Yuxin Peng, Jianguo Xiao
JNSM
2000
96views more  JNSM 2000»
13 years 8 months ago
Multi-service Dynamic QoS Routing Schemes with Call Admission Control: A Comparative Study
In this paper, we consider wide-area backbone networks where multiple connection-oriented guaranteed services with differing bandwidth/flow requirements are offered. Specifically,...
Deep Medhi, I. Sukiman
SAC
2002
ACM
13 years 8 months ago
Benefits of document maps for text access in knowledge management: a comparative study
Analyzing, structuring and organizing documented knowledge is an important aspect of knowledge management. In order to ease the access to text collections, in literature so-called...
Andreas Becks, Christian Seeling, Ralf Minkenberg