Sciweavers

408 search results - page 55 / 82
» Tailoring Privacy to Users' Needs
Sort
View
EUROSPI
2005
Springer
14 years 1 months ago
Using Rational Unified Process in an SME - A Case Study
The Rational Unified Process (RUP) is a comprehensive software development process framework emphasizing use-cases, architecture focus and an iterative approach. RUP is widely know...
Geir Kjetil Hanssen, Hans Westerheim, Finn Olav Bj...
AUSAI
2003
Springer
14 years 1 months ago
Information Extraction via Path Merging
Abstract. In this paper, we describe a new approach to information extraction that neatly integrates top-down hypothesis driven information with bottom-up data driven information. ...
Robert Dale, Cécile Paris, Marc Tilbrook
HICSS
2011
IEEE
183views Biometrics» more  HICSS 2011»
12 years 11 months ago
Optimizing Access across Multiple Hierarchies in Data Warehouses
In enterprise data warehouses, different users in different business units often define their own application specific dimension hierarchies tailor made to their reporting and b...
Lipyeow Lim, Bishwaranjan Bhattacharjee
CCS
2010
ACM
13 years 8 months ago
Demonstrating cognitive packet network resilience to worm attacks
The need for network stability and reliability has led to the growth of autonomic networks [2] that can provide more stable and more reliable communications via on-line measuremen...
Georgia Sakellari, Erol Gelenbe
IADIS
2008
13 years 9 months ago
Autonomous Presentation Capture In Corporate And Educational Settings
While researchers have been exploring automatic presentation capture since the 1990's, real world adoption has been limited. Our research focuses on simplifying presentation ...
David M. Hilbert, Thea Turner, Laurent Denoue, Kan...