Sciweavers

352 search results - page 58 / 71
» The usage of stochastic processes in embedded system specifi...
Sort
View
RE
2005
Springer
14 years 2 months ago
The Role of Deferred Requirements in a Longitudinal Study of Emailing
Our group has taken a clinical approach to doing requirements engineering for a specific domain: delivering email tools to the cognitively impaired population. The clinical view s...
Stephen Fickas, William N. Robinson, McKay Moore S...
EICS
2010
ACM
13 years 6 months ago
An automated routine for menu structure optimization
We propose an automated routine for hierarchical menu structure optimization. A computer advice-giving system founded on the mathematical model of menu navigation directs the desi...
Mikhail V. Goubko, Alexander I. Danilenko
CN
2007
168views more  CN 2007»
13 years 8 months ago
Network anomaly detection with incomplete audit data
With the ever increasing deployment and usage of gigabit networks, traditional network anomaly detection based Intrusion Detection Systems (IDS) have not scaled accordingly. Most,...
Animesh Patcha, Jung-Min Park
DAC
2009
ACM
14 years 9 months ago
Non-intrusive dynamic application profiling for multitasked applications
Application profiling ? the process of monitoring an application to determine the frequency of execution within specific regions ? is an essential step within the design process f...
Karthik Shankar, Roman L. Lysecky
KES
2006
Springer
13 years 8 months ago
Solving power and trust conflicts through argumentation in agent-mediated knowledge distribution
Distributing pieces of knowledge in large, usually distributed organizations is a central problem in Knowledge and Organization management. Policies for distributing knowledge and...
Carlos Iván Chesñevar, Ramón ...