Sciweavers

1969 search results - page 15 / 394
» Incremental Processing and Acceptability
Sort
View
ICISC
2004
169views Cryptology» more  ICISC 2004»
13 years 11 months ago
ADWICE - Anomaly Detection with Real-Time Incremental Clustering
Abstract. Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in...
Kalle Burbeck, Simin Nadjm-Tehrani
AGILEDC
2007
IEEE
14 years 4 months ago
On the Sustained Use of a Test-Driven Development Practice at IBM
Test-Driven Development (TDD) is an agile practice that is widely accepted and advocated by most agile methods and methodologists. In this paper, we report on a post hoc analysis ...
Julio Cesar Sanchez, Laurie A. Williams, E. Michae...
ATAL
2006
Springer
14 years 1 months ago
Monotonic concession protocols for multilateral negotiation
The most natural way of thinking about negotiation is probably a situation whereby each of the parties involved initially make a proposal that is particularly beneficial to themse...
Ulle Endriss
ACSW
2004
13 years 11 months ago
Cost-Efficient Mining Techniques for Data Streams
A data stream is a continuous and high-speed flow of data items. High speed refers to the phenomenon that the data rate is high relative to the computational power. The increasing...
Mohamed Medhat Gaber, Shonali Krishnaswamy, Arkady...
IJISTA
2010
109views more  IJISTA 2010»
13 years 8 months ago
BKCAS: a distributed context-aware pervasive information system to support user roaming
- Over the last few years, Pervasive Computing has become a very active research topic in both academia and industry. In spite of its undeniable benefit, until recently, the wide d...
Nguyen Chan Hung, Vu Thanh Vinh, Nguyen Huu Thang,...