Sciweavers

265 search results - page 42 / 53
» Differences Triple Spaces = Active Triple Spaces
Sort
View
IEEEARES
2006
IEEE
14 years 2 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
MM
2005
ACM
110views Multimedia» more  MM 2005»
14 years 2 months ago
Photo LOI: browsing multi-user photo collections
The number of digital photographs is growing beyond the abilities of individuals to easily manage and understand their own photo collections. Photo LOI (Level of Interest) is a te...
Rahul Nair, Nick Reid, Marc Davis
CP
2005
Springer
14 years 2 months ago
Applying Constraint Programming to Rigid Body Protein Docking
In this paper we show how Constraint Programming (CP) techniques can improve the efficiency and applicability of grid-based algorithms for optimising surface contact between comple...
Ludwig Krippahl, Pedro Barahona
EUROSPI
2005
Springer
14 years 2 months ago
Goal-Driven Requirements Engineering for Supporting the ISO 15504 Assessment Process
It is advocated to use the ISO/IEC 15504 standard into new domains not related to Information Technology (IT), giving a powerful enterprise-wide assessment tool for quality manager...
André Rifaut
HT
2004
ACM
14 years 2 months ago
Display-agnostic hypermedia
In the diversifying information environment, contemporary hypermedia authoring and filtering mechanisms cater to specific devices. Display-agnostic hypermedia can be flexibly and ...
Unmil Karadkar, Richard Furuta, Selen Ustun, Young...