Sciweavers

691 search results - page 37 / 139
» Design comparisons for procurement systems
Sort
View
135
Voted
SOFTVIS
2010
ACM
15 years 1 months ago
VIPERS: visual prototyping environment for real-time imaging systems
This paper presents a novel environment for the visual design and prototyping of computer vision systems. The proposed environment consists of a modular architecture, where each m...
Frédéric Jean, Alexandra Branzan Alb...
CTW
2006
88views more  CTW 2006»
15 years 3 months ago
Using multiple cognitive task analysis methods for supervisory control interface design in high-throughput biological screening
Cognitive task analysis (CTA) approaches are currently needed in many domains to provide explicit guidance on redesigning existing systems. This study used goal-directed task analy...
David B. Kaber, Noa Segall, Rebecca S. Green, K. E...
109
Voted
IJNSEC
2007
119views more  IJNSEC 2007»
15 years 3 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
132
Voted
IDEAS
2007
IEEE
135views Database» more  IDEAS 2007»
15 years 9 months ago
Bitmap Index Design Choices and Their Performance Implications
Historically, bitmap indexing has provided an important database capability to accelerate queries. However, only a few database systems have implemented these indexes because of t...
Elizabeth J. O'Neil, Patrick E. O'Neil, Kesheng Wu
106
Voted
WETICE
2006
IEEE
15 years 9 months ago
A Trust-enabled P2P Recommender System
In this paper we present a trust-oriented method that can be used when building P2P recommender systems. We discuss its benefits in comparison to centralized solutions, its requir...
Georgios Pitsilis, Lindsay Marshall