Sciweavers

424 search results - page 36 / 85
» Requirements Prioritization Challenges in Practice
Sort
View
CCS
2004
ACM
14 years 1 months ago
Operational experiences with high-volume network intrusion detection
In large-scale environments, network intrusion detection systems (NIDSs) face extreme challenges with respect to traffic volume, traffic diversity, and resource management. Whil...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
OTM
2010
Springer
13 years 5 months ago
Measuring Software Systems Scalability for Proactive Data Center Management
The current trend of increasingly larger Web-based applications makes scalability the key challenge when developing, deploying, and maintaining data centers. At the same time, the ...
Nuno A. Carvalho, José Pereira
JMLR
2010
165views more  JMLR 2010»
13 years 2 months ago
Feature Selection: An Ever Evolving Frontier in Data Mining
The rapid advance of computer technologies in data processing, collection, and storage has provided unparalleled opportunities to expand capabilities in production, services, comm...
Huan Liu, Hiroshi Motoda, Rudy Setiono, Zheng Zhao
MICCAI
2006
Springer
14 years 1 months ago
Simultaneous Stereoscope Localization and Soft-Tissue Mapping for Minimal Invasive Surgery
Minimally Invasive Surgery (MIS) has recognized benefits of reduced patient trauma and recovery time. In practice, MIS procedures present a number of challenges due to the loss of ...
Peter Mountney, Danail Stoyanov, Andrew Davison, G...
CHIMIT
2009
ACM
14 years 2 months ago
A case study of enterprise identity management system adoption in an insurance organization
This case study describes the adoption of an enterprise identity management(IdM) system in an insurance organization. We describe the state of the organization before deploying th...
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...