Sciweavers

261 search results - page 52 / 53
» A Reasoning Model Based on the Production of Acceptable Argu...
Sort
View
ACSAC
2008
IEEE
14 years 15 days ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
SPE
2002
105views more  SPE 2002»
13 years 5 months ago
Specifying a role-based guide for learning to work with an enterprise framework
Learning to work with enterprise frameworks requires considerable effort, because of the inherent complexity of all the knowledge that is needed. However, different roles in proje...
Wilhelm Hasselbring, Ralph van den Houdt
GIS
2006
ACM
14 years 7 months ago
Optimization of multiple continuous queries over streaming satellite data
Remotely sensed data, in particular satellite imagery, play many important roles in environmental applications and models. In particular applications that study (rapid) changes in...
Quinn Hart, Michael Gertz
TREC
2008
13 years 7 months ago
TREC 2008 at the University at Buffalo: Legal and Blog Track
In the TREC 2008, the team from the State University of New York at Buffalo participated in the Legal track and the Blog track. For the Legal track, we worked on the interactive s...
Jianqiang Wang, Ying Sun, Omar Mukhtar, Rohini K. ...
WM
2003
13 years 7 months ago
Experience Management within Project Management Processes
: The business process revolution has had two impacts on project management: the recognition of a process perspective (such as the 39 appearing in the PMBOK), and the acknowledgeme...
Maya Kaner, Reuven Karni