Sciweavers

1545 search results - page 295 / 309
» Information Systems Success Revisited
Sort
View
ANCS
2006
ACM
14 years 1 months ago
WormTerminator: an effective containment of unknown and polymorphic fast spreading worms
The fast spreading worm is becoming one of the most serious threats to today’s networked information systems. A fast spreading worm could infect hundreds of thousands of hosts w...
Songqing Chen, Xinyuan Wang, Lei Liu, Xinwen Zhang
SOUPS
2006
ACM
14 years 1 months ago
An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench
Today organizations do not have good ways of linking their written privacy policies with the implementation of those policies. To assist organizations in addressing this issue, ou...
Carolyn Brodie, Clare-Marie Karat, John Karat
ISMIR
2005
Springer
168views Music» more  ISMIR 2005»
14 years 26 days ago
A Novel HMM Approach to Melody Spotting in Raw Audio Recordings
This paper presents a melody spotting system based on Variable Duration Hidden Markov Models (VDHMM’s), capable of locating monophonic melodies in a database of raw audio record...
Aggelos Pikrakis, Sergios Theodoridis
EMSOFT
2004
Springer
14 years 23 days ago
Approximation of the worst-case execution time using structural analysis
We present a technique to approximate the worst-case execution time that combines structural analysis with a loop-bounding algorithm based on local induction variable analysis. St...
Matteo Corti, Thomas R. Gross
HT
2003
ACM
14 years 18 days ago
Simplifying annotation support for real-world-settings: a comparative study of active reading
Despite the multitude of existing interfaces for annotation, little is known about their influence on the created annotations. In this paper, first findings of a comparative video...
Hartmut Obendorf