Sciweavers

7526 search results - page 1408 / 1506
» The Design and Implementation of the A2QM3 System
Sort
View
NSPW
2004
ACM
14 years 2 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
UIST
2004
ACM
14 years 2 months ago
A remote control interface for large displays
We describe a new widget and interaction technique, known as a “Frisbee,” for interacting with areas of a large display that are difficult or impossible to access directly. A ...
Azam Khan, George W. Fitzmaurice, Don Almeida, Nic...
WIDM
2004
ACM
14 years 2 months ago
Probabilistic models for focused web crawling
A Focused crawler must use information gleaned from previously crawled page sequences to estimate the relevance of a newly seen URL. Therefore, good performance depends on powerfu...
Hongyu Liu, Evangelos E. Milios, Jeannette Janssen
WOSS
2004
ACM
14 years 2 months ago
Towards a knowledge-based approach to architectural adaptation management
Self-adaptive software continually evaluates and modifies its own behavior to meet changing demands. One of the key issues in constructing such software is that of planning when a...
John C. Georgas, Richard N. Taylor
APWEB
2004
Springer
14 years 2 months ago
Semantic, Hierarchical, Online Clustering of Web Search Results
Today, search engine is the most commonly used tool for Web information retrieval, however, its current status is still far from satisfaction. This paper focuses on clustering Web...
Dell Zhang, Yisheng Dong
« Prev « First page 1408 / 1506 Last » Next »