CT This paper describes experiences from two organizations that have used the Riskit method for risk management in their software projects. This paper presents the Riskit method, t...
Programs accessing disk-resident arrays, called out-of-core programs, perform poorly in general due to an excessive number of I/O calls and insufficient help from compilers. In ord...
Mahmut T. Kandemir, Alok N. Choudhary, J. Ramanuja...
It is a well-known problem that intrusion detection systems overload their human operators by triggering thousands of alarms per day. As a matter of fact, we have been asked by on...
This paper presents an unified view of most previous table-lookup-and-addition methods: bipartite tables, SBTM, STAM and multipartite methods. This new definition allows a more ac...
Text Summarization and categorization have always been two of the most demanding information retrieval tasks. Deploying a generalized, multifunctional mechanism that produces good ...