Sciweavers

2757 search results - page 518 / 552
» Empirical investigations of conceptual modeling and the mode...
Sort
View
SERP
2007
13 years 10 months ago
Software Engineering Design Patterns for Relational Databases
– The use of design patterns such as the GRASP (General Responsibility Assignment Software Principles) or GoF (Gang-of-Four) patterns in software engineering has been well-docume...
Cyril S. Ku, Thomas J. Marlowe, Tatyana Budanskaya...
CSREASAM
2006
13 years 10 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
ERSA
2003
126views Hardware» more  ERSA 2003»
13 years 10 months ago
Co-Simulation of a Hybrid Multi-Context Architecture
Abstract— Reconfigurable computing architectures aim to dynamically adapt their hardware to the application at hand. As research shows, the time it takes to reconfigure the har...
Rolf Enzler, Christian Plessl, Marco Platzner
TREC
2007
13 years 9 months ago
MultiText Legal Experiments at TREC 2007
For the legal track we used the Wumpus search engine and investigated several methods that have proven successful in other domains, including cover density ranking and Okapi BM25 ...
Stefan Büttcher, Charles L. A. Clarke, Gordon...
DRR
2008
13 years 9 months ago
Interactive degraded document enhancement and ground truth generation
Degraded documents are frequently obtained in various situations. Examples of degraded document collections include historical document depositories, document obtained in legal an...
G. Bal, Gady Agam, Ophir Frieder, Gideon Frieder