Sciweavers

151 search results - page 18 / 31
» Requirements for a Practical Network Event Recognition Langu...
Sort
View
EIT
2008
IEEE
14 years 2 months ago
Taming XML: Objects first, then markup
Abstract—Processing markup in object-oriented languages often requires the programmer to focus on the objects generating the markup rather than the more pertinent domain objects....
Matt Bone, Peter F. Nabicht, Konstantin Läufe...
CVHI
2007
13 years 9 months ago
SUBPAL: A Device for Reading Aloud Subtitles from Television and Cinema
: The primary focus of this paper is accessibility barriers for visually impaired people and people with dyslexia. Due to their disability a segment of these people have limited ac...
Simon Nielsen, Hans-Heinrich Bothe
BIS
2010
185views Business» more  BIS 2010»
13 years 5 months ago
From Economic Drivers to B2B Process Models: A Mapping from REA to UMM
Inter-organizational B2B systems are most likely tending to change their business requirements over time - e.g. establishing new partnerships or change existing ones. The problem i...
Rainer Schuster, Thomas Motal, Christian Huemer, H...
KBSE
2005
IEEE
14 years 1 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
ANCS
2008
ACM
13 years 9 months ago
Design of a scalable network programming framework
Nearly all programmable commercial hardware solutions offered for high-speed networking systems are capable of meeting the performance and flexibility requirements of equipment ve...
Ben Wun, Patrick Crowley, Arun Raghunath