Sciweavers

6846 search results - page 1335 / 1370
» Developing an Active Observer
Sort
View
CEAS
2008
Springer
13 years 12 months ago
Tracking Email Reputation for Authenticated Sender Identities
With the amount of unsolicited emails on the rise, domain authentication schemes have been widely deployed to identify senders. Establishing a sender's identity does not guar...
Gautam Singaraju, Jeffrey Moss, Brent ByungHoon Ka...
ACMSE
2006
ACM
13 years 12 months ago
Phoenix-based clone detection using suffix trees
A code clone represents a sequence of statements that are duplicated in multiple locations of a program. Clones often arise in source code as a result of multiple cut/paste operat...
Robert Tairas, Jeff Gray
AH
2006
Springer
13 years 12 months ago
Dynamic Content Discovery, Harvesting and Delivery, from Open Corpus Sources, for Adaptive Systems
Personalised elearning is being heralded as one of the grand challenges of next generation learning systems, in particular, its ability to support greater effectiveness, efficiency...
Séamus Lawless, Vincent Wade
DAC
2005
ACM
13 years 12 months ago
A combined feasibility and performance macromodel for analog circuits
The need to reuse the performance macromodels of an analog circuit topology challenges existing regression based modeling techniques. A model of good reusability should have a num...
Mengmeng Ding, Ranga Vemuri
DEBS
2007
ACM
13 years 11 months ago
Identification of suspicious, unknown event patterns in an event cloud
This paper describes an approach to detect unknown event patterns. In this context, an event is not only something that happens, but also something that can be analysed. This task...
Alexander Widder, Rainer von Ammon, Philippe Schae...
« Prev « First page 1335 / 1370 Last » Next »