Sciweavers

3506 search results - page 655 / 702
» Pattern recognition in information systems
Sort
View
NSPW
2004
ACM
14 years 2 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
UIST
2004
ACM
14 years 2 months ago
Automatic projector calibration with embedded light sensors
Projection technology typically places several constraints on the geometric relationship between the projector and the projection surface to obtain an undistorted, properly sized ...
Johnny C. Lee, Paul H. Dietz, Dan Maynes-Aminzade,...
COORDINATION
2004
Springer
14 years 2 months ago
O'Klaim: A Coordination Language with Mobile Mixins
This paper presents O’KLAIM (Object-Oriented KLAIM), a linguistic extension of the higher-order calculus for mobile processes KLAIM with objectoriented features. Processes intera...
Lorenzo Bettini, Viviana Bono, Betti Venneri
ICSE
2001
IEEE-ACM
14 years 1 months ago
An Empirical Study of Global Software Development: Distance and Speed
Global software development is rapidly becoming the norm for technology companies. Previous qualitative research suggests that multi-site development may increase development cycl...
James D. Herbsleb, Audris Mockus, Thomas A. Finhol...
KDD
2001
ACM
226views Data Mining» more  KDD 2001»
14 years 1 months ago
Image Mining: Issues, Frameworks and Techniques
Advances in image acquisition and storage technology have led to tremendous growth in significantly large and detailed image databases. These images, if analyzed, can reveal usefu...
Ji Zhang, Wynne Hsu, Mong-Li Lee