Sciweavers

247 search results - page 6 / 50
» Roles Are Really Great!
Sort
View
ICSM
2009
IEEE
14 years 4 months ago
Playing roles in design patterns: An empirical descriptive and analytic study
This work presents a descriptive and analytic study of classes playing zero, one, or two roles in six different design patterns (and combinations thereof). First, we answer three...
Foutse Khomh, Yann-Gaël Guéhéne...
ISI
2004
Springer
14 years 3 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
ICIP
2005
IEEE
14 years 11 months ago
The role of the virtual channel in distributed source coding of video
In distributed video source coding side-information at the decoder is generated as a temporal prediction based on previous frames. This creates a virtual dependency channel betwee...
Ronald P. Westerlaken, Rene Klein Gunnewiek, Inald...
CHI
2007
ACM
14 years 10 months ago
The role of choice and customization on users' interaction with embodied conversational agents: effects on perception and perfor
We performed an empirical study exploring people's interactions with an embodied conversational agent (ECA) while performing two tasks. Conditions varied with respect to 1) w...
Jun Xiao, John T. Stasko, Richard Catrambone
ISSADS
2005
Springer
14 years 3 months ago
On the Role of Information Compaction to Intrusion Detection
An intrusion detection system (IDS) usually has to analyse Giga-bytes of audit information. In the case of anomaly IDS, the information is used to build a user profile characteris...
Fernando Godínez, Dieter Hutter, Raul Monro...