Sciweavers

6624 search results - page 1189 / 1325
» Design Pattern Recognition
Sort
View
122
Voted
SELMAS
2005
Springer
15 years 8 months ago
A Product-Line Approach to Promote Asset Reuse in Multi-agent Systems
Software reuse technologies have been a driving force in significantly reducing both the time and cost of software specification, development, maintenance and evolution. However, t...
Josh Dehlinger, Robyn R. Lutz
102
Voted
NSPW
2004
ACM
15 years 8 months ago
The user non-acceptance paradigm: INFOSEC's dirty little secret
(by Victor Raskin) This panel will address users’ perceptions and misperceptions of the risk/benefit and benefit/nuisance ratios associated with information security products, an...
Steven J. Greenwald, Kenneth G. Olthoff, Victor Ra...
101
Voted
NSPW
2004
ACM
15 years 8 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
115
Voted
SAC
2004
ACM
15 years 8 months ago
Axes-based visualizations with radial layouts
In the analysis of multidimensional data sets questions involving detection of extremal events, correlations, patterns and trends play an increasingly important role in a variety ...
Christian Tominski, James Abello, Heidrun Schumann
131
Voted
SC
2004
ACM
15 years 8 months ago
A Self-Organizing Storage Cluster for Parallel Data-Intensive Applications
Cluster-based storage systems are popular for data-intensive applications and it is desirable yet challenging to provide incremental expansion and high availability while achievin...
Hong Tang, Aziz Gulbeden, Jingyu Zhou, William Str...
« Prev « First page 1189 / 1325 Last » Next »