Sciweavers

1061 search results - page 176 / 213
» Experiences with Honeypot Systems: Development, Deployment, ...
Sort
View
ECOOP
2009
Springer
14 years 10 months ago
Practical API Protocol Checking with Access Permissions
Reusable APIs often dene usage protocols. We previously developed a sound modular type system that checks compliance with typestate-based protocols while aording a great deal of al...
Kevin Bierhoff, Nels E. Beckman, Jonathan Aldrich
MDAI
2005
Springer
14 years 2 months ago
Meta-data: Characterization of Input Features for Meta-learning
Abstract. Common inductive learning strategies offer the tools for knowledge acquisition, but possess some inherent limitations due to the use of fixed bias during the learning p...
Ciro Castiello, Giovanna Castellano, Anna Maria Fa...
CSCW
2004
ACM
14 years 2 months ago
Predictors of availability in home life context-mediated communication
A number of studies have explored issues of interruption and availability in workplace environments, but few have examined how attitudes toward availability play out in home life....
Kristine S. Nagel, James M. Hudson, Gregory D. Abo...
EUROMICRO
2003
IEEE
14 years 2 months ago
Extreme Programming: First Results from a Controlled Case Study
Extreme programming (XP) is the most well known agile software development method. Many experience reports have been published in recent years. Successful XP adoptions have howeve...
Pekka Abrahamsson
IFSA
2003
Springer
89views Fuzzy Logic» more  IFSA 2003»
14 years 2 months ago
Lattice Fuzzy Signal Operators and Generalized Image Gradients
In this paper we use concepts from the lattice-based theory of morphological operators and fuzzy sets to develop generalized lattice image operators that are nonlinear convolutions...
Petros Maragos, Vassilis Tzouvaras, Giorgos B. Sta...