Sciweavers

5829 search results - page 977 / 1166
» The Practice of Cluster Analysis
Sort
View
ACMICEC
2004
ACM
85views ECommerce» more  ACMICEC 2004»
15 years 10 months ago
Governance enterprise architecture (GEA): domain models for e-governance
Public administrations all over the world promote ambitious and costly e-government programmes. The required domain analysis is usually conducted on a local and ad hoc basis, due ...
Vassilios Peristeras, Konstantinos A. Tarabanis
123
Voted
ISPD
2004
ACM
150views Hardware» more  ISPD 2004»
15 years 10 months ago
Topology optimization of structured power/ground networks
This paper presents an efficient method for optimizing the design of power/ground (P/G) networks by using locally regular, globally irregular grids. The procedure divides the pow...
Jaskirat Singh, Sachin S. Sapatnekar
135
Voted
ISSTA
2004
ACM
15 years 10 months ago
Faster constraint solving with subtypes
Constraints in predicate or relational logic can be translated into boolean logic and solved with a SAT solver. For faster solving, it is common to exploit the typing of predicate...
Jonathan Edwards, Daniel Jackson, Emina Torlak, Vi...
115
Voted
NSPW
2004
ACM
15 years 10 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
SIGCSE
2004
ACM
84views Education» more  SIGCSE 2004»
15 years 10 months ago
Core empirical concepts and skills for computer science
Educators are increasingly acknowledging that practical problems in computer science demand basic competencies in experimentation and data analysis. However, little effort has bee...
Grant Braught, Craig S. Miller, David W. Reed