Sciweavers

5766 search results - page 1024 / 1154
» Reverse Engineering of Data
Sort
View
ACMSE
2007
ACM
15 years 8 months ago
A self-testing autonomic container
Many strategies have been proposed to address the problems associated with managing increasingly complex computing systems. IBM's Autonomic Computing (AC) paradigm is one suc...
Ronald Stevens, Brittany Parsons, Tariq M. King
ACMSE
2007
ACM
15 years 8 months ago
Hierarchical land cover information retrieval in object-oriented remote sensing image databases with native queries
Classification and change detection of land cover types in the remotely sensed images is one of the major applications in remote sensing. This paper presents a hierarchical framew...
Jiang Li
AOSE
2007
Springer
15 years 8 months ago
AgentPrIMe: Adapting MAS Designs to Build Confidence
The products of systems cannot always be judged at face value: the process by which they were obtained is also important. For instance, the rigour of a scientific experiment, the e...
Simon Miles, Paul T. Groth, Steve Munroe, Michael ...
CHIMIT
2007
ACM
15 years 8 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
CIDM
2007
IEEE
15 years 8 months ago
Designing a Fuzzy Rule Based System to Estimate Depth of Anesthesia
Estimating the depth of anesthesia (DOA) is still a challenging area in anesthesia research. The objective of this study was to design a fuzzy rule based system which integrates el...
V. Esmaeili, Amin Assareh, M. B. Shamsollahi, Moha...
« Prev « First page 1024 / 1154 Last » Next »