Sciweavers

4033 search results - page 660 / 807
» Design patterns in enterprise
Sort
View
RSFDGRC
2005
Springer
156views Data Mining» more  RSFDGRC 2005»
15 years 10 months ago
Intrusion Detection System Based on Multi-class SVM
In this paper, we propose a new intrusion detection model, which keeps advantages of existing misuse detection model and anomaly detection model and resolves their problems. This ...
Hansung Lee, Jiyoung Song, Daihee Park
SELMAS
2005
Springer
15 years 10 months ago
A Product-Line Approach to Promote Asset Reuse in Multi-agent Systems
Software reuse technologies have been a driving force in significantly reducing both the time and cost of software specification, development, maintenance and evolution. However, t...
Josh Dehlinger, Robyn R. Lutz
CSCW
2004
ACM
15 years 9 months ago
Predictors of availability in home life context-mediated communication
A number of studies have explored issues of interruption and availability in workplace environments, but few have examined how attitudes toward availability play out in home life....
Kristine S. Nagel, James M. Hudson, Gregory D. Abo...
MM
2004
ACM
244views Multimedia» more  MM 2004»
15 years 9 months ago
Automatic replay generation for soccer video broadcasting
While most current approaches for sports video analysis are based on broadcast video, in this paper, we present a novel approach for highlight detection and automatic replay gener...
Jinjun Wang, Changsheng Xu, Chng Eng Siong, Kongwa...
NSPW
2004
ACM
15 years 9 months ago
The user non-acceptance paradigm: INFOSEC's dirty little secret
(by Victor Raskin) This panel will address users’ perceptions and misperceptions of the risk/benefit and benefit/nuisance ratios associated with information security products, an...
Steven J. Greenwald, Kenneth G. Olthoff, Victor Ra...