Sciweavers

1099 search results - page 203 / 220
» Evaluating Integration Architectures - A Scenario-Based Eval...
Sort
View
IJIIDS
2008
201views more  IJIIDS 2008»
13 years 8 months ago
MALEF: Framework for distributed machine learning and data mining
: Growing importance of distributed data mining techniques has recently attracted attention of researchers in multiagent domain. Several agent-based application have been already c...
Jan Tozicka, Michael Rovatsos, Michal Pechoucek, S...
DTJ
1998
171views more  DTJ 1998»
13 years 8 months ago
Measurement and Analysis of C and C++ Performance
ir increasing use of abstraction, modularity, delayed binding, polymorphism, and source reuse, especially when these attributes are used in combination. Modern processor architectu...
Hemant G. Rotithor, Kevin W. Harris, Mark W. Davis
GI
2009
Springer
13 years 6 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
WWW
2008
ACM
14 years 9 months ago
Keysurf: a character controlled browser for people with physical disabilities
For many users with a physical or motor disability, using a computer mouse or other pointing device to navigate the web is cumbersome or impossible due to problems with pointing a...
Leo Spalteholz, Kin Fun Li, Nigel Livingston, Foad...
WWW
2001
ACM
14 years 9 months ago
On representation of a highlight on the Web: the amber room as a cultural phenomenon in progress
"The Amber Room on the Web" project provides wide public access to information about the process of reconstruction of the Amber Room of the Catherine Palace outside of S...
Tatyana G. Bogomazova, Cyrill A. Malevanov