Sciweavers

3511 search results - page 617 / 703
» Evaluation Methods for Groupware Systems
Sort
View
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
14 years 14 days ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
ICSE
1998
IEEE-ACM
14 years 12 days ago
Parallel Changes in Large Scale Software Development: An Observational Case Study
An essential characteristic of large scale software development is parallel development by teams of developers. How this parallel development is structured and supported has a pro...
Dewayne E. Perry, Harvey P. Siy, Lawrence G. Votta
HT
1997
ACM
14 years 11 days ago
Spatial Hypertext and the Practice of Information Triage
Information triage is the process of sorting through relevant materials, and organizing them to meet the needs of the task at hand. It is a practice that has become increasingly c...
Catherine C. Marshall, Frank M. Shipman III
VLDB
1992
ACM
151views Database» more  VLDB 1992»
14 years 7 days ago
A Uniform Approach to Processing Temporal Queries
Research in temporal databases has mainly focused on defining temporal data models by extending existing models, and developing access structures for temporal data. Little has bee...
Umeshwar Dayal, Gene T. J. Wuu
ACIVS
2007
Springer
14 years 6 days ago
A Multi-agent Approach for Range Image Segmentation with Bayesian Edge Regularization
Abstract. We present and evaluate in this paper a multi-agent approach for range image segmentation. The approach consists in using autonomous agents for the segmentation of a rang...
Smaine Mazouzi, Zahia Guessoum, Fabien Michel, Moh...