Sciweavers

641 search results - page 95 / 129
» Identifying Contingency Requirements Using Obstacle Analysis
Sort
View
AVI
2006
13 years 10 months ago
Task-at-hand interface for change detection in stock market data
Companies trading stocks need to store information on stock prices over specific time intervals, which results in very large databases. Large quantities of numerical data (thousan...
Carmen Sanz Merino, Mike Sips, Daniel A. Keim, Chr...
JSAC
2006
128views more  JSAC 2006»
13 years 8 months ago
A framework for misuse detection in ad hoc networks- part II
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically stop functioning due to operational failu...
D. Subhadrabandhu, S. Sarkar, F. Anjum
TSE
2008
113views more  TSE 2008»
13 years 8 months ago
Discovering Neglected Conditions in Software by Mining Dependence Graphs
Neglected conditions are an important but difficult-to-find class of software defects. This paper presents a novel approach for revealing neglected conditions that integrates stati...
Ray-Yaung Chang, Andy Podgurski, Jiong Yang
TMI
2010
94views more  TMI 2010»
13 years 7 months ago
Theoretical Bounds and System Design for Multipinhole SPECT
Abstract—The pinhole camera in single photon emission computed tomography (SPECT) has an inherent trade-off between resolution and sensitivity. Recent systems overcome this to so...
Peter Nillius, Mats Danielsson
ICDM
2010
IEEE
96views Data Mining» more  ICDM 2010»
13 years 6 months ago
Domain-Driven Data Mining for IT Infrastructure Support
Abstract--Support analytics (i.e., statistical analysis, modeling and mining of customer/operations support tickets data) is important in service industries. In this paper, we adop...
Girish Keshav Palshikar, Harrick M. Vin, Mohammed ...