Sciweavers

1367 search results - page 234 / 274
» Describing Business Processes with Use Cases
Sort
View
ISMIS
2005
Springer
15 years 10 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
PDP
2003
IEEE
15 years 10 months ago
A Parallel Evolutionary Algorithm for Circuit Partitioning
As general-purpose parallel computers are increasingly being used to speed up different VLSI applications, the development of parallel algorithms for circuit testing, logic minimi...
Raul Baños, Consolación Gil, Maria D...
SIGMOD
2010
ACM
168views Database» more  SIGMOD 2010»
15 years 9 months ago
SimDB: a similarity-aware database system
The identification and processing of similarities in the data play a key role in multiple application scenarios. Several types of similarity-aware operations have been studied in ...
Yasin N. Silva, Ahmed M. Aly, Walid G. Aref, Per-&...
RE
1999
Springer
15 years 9 months ago
An Empirical Investigation of Multiple Viewpoint Reasoning in Requirements Engineering
Multiple viewpoints are often used in Requirements Engineering to facilitate traceability to stakeholders, to structure the requirements process, and to provide richer modelling b...
Tim Menzies, Steve M. Easterbrook, Bashar Nuseibeh...
LREC
2008
93views Education» more  LREC 2008»
15 years 6 months ago
First Broadcast News Transcription System for Khmer Language
In this paper we present an overview on the development of a large vocabulary continuous speech recognition (LVCSR) system for Khmer, the official language of Cambodia, spoken by ...
Sopheap Seng, Sethserey Sam, Laurent Besacier, Bri...