Sciweavers

80 search results - page 8 / 16
» Looking Back
Sort
View
ACMSE
2004
ACM
14 years 3 months ago
A P2P intrusion detection system based on mobile agents
Traditional intrusion detection systems have a central coordinator with a static hierarchical architecture. We propose a peer-to-peer intrusion detection system that has no centra...
Geetha Ramachandran, Delbert Hart
DSS
2008
97views more  DSS 2008»
13 years 10 months ago
On supply chain cash flow risks
This study models the supply chain related cash flow risks for a business entity measured by the standard deviations of cash inflows, outflows, and netflows of each period in a pl...
Chih-Yang Tsai
SOFSEM
2010
Springer
14 years 6 months ago
Lessons in Software Evolution Learned by Listening to Smalltalk
The biggest challenge facing software developers today is how to gracefully evolve complex software systems in the face of changing requirements. We clearly need software systems t...
Oscar Nierstrasz, Tudor Gîrba
TEI
2010
ACM
121views Hardware» more  TEI 2010»
14 years 4 months ago
Myglobe: a navigation service based on cognitive maps
Myglobe is a user generated navigation service that enables users to share each cognitive map with one another. Cognitive map is a personalized map, shape of which is emphasized a...
Takuo Imbe, Fumitaka Ozaki, Shin Kiyasu, Yusuke Mi...
CINQ
2004
Springer
116views Database» more  CINQ 2004»
14 years 1 months ago
A Survey on Condensed Representations for Frequent Sets
Abstract. Solving inductive queries which have to return complete collections of patterns satisfying a given predicate has been studied extensively the last few years. The specific...
Toon Calders, Christophe Rigotti, Jean-Franç...