Sciweavers

13895 search results - page 125 / 2779
» Exploring
Sort
View
RAID
2009
Springer
14 years 4 months ago
Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration
Abstract. Signature-based input filtering is an important and widely deployed defense. But current signature generation methods have limited coverage and the generated signatures ...
Juan Caballero, Zhenkai Liang, Pongsin Poosankam, ...
HICSS
2008
IEEE
147views Biometrics» more  HICSS 2008»
14 years 4 months ago
Exploring Barriers to Innovation Diffusion in Health Care Service Organizations: An Issue for Effective Integration of Service A
- This study explores the diffusion of innovations in health care service organizations. The importance of the diffusion arises from the direct effect of innovations on the quality...
Tugrul U. Daim, R. Tarcan Tarman, Nuri Basoglu
ICDIM
2008
IEEE
14 years 4 months ago
Population-variance and explorative power of Harmony Search: An analysis
This paper presents a simple mathematical analysis of some features of the Harmony Search algorithm (HS). HS is a recently developed derivative-free optimization algorithm, which ...
Arpan Mukhopadhyay, Anwit Roy, Sourav Das, Swagata...
WCRE
2008
IEEE
14 years 4 months ago
A Business Process Explorer: Recovering Business Processes from Business Applications
A business process contains a set of logically related tasks executed to fulfill business goals. Business applications enable organizations to automatically perform their daily op...
Jin Guo, Ying Zou
IAT
2007
IEEE
14 years 4 months ago
Exploring Social Behaviour of Honey Bees Searching on the Web
This paper discusses applying the social behaviour of bees to the web search. We proposed an on-line search of the user’s predefined group of pages. In particular, this approac...
Pavol Návrat, Lucia Jastrzembska, Tomas Jel...