Sciweavers

27 search results - page 3 / 6
» Unified Information Models in Support of Location Transparen...
Sort
View
ESEM
2007
ACM
13 years 7 months ago
Mining Software Evolution to Predict Refactoring
Can we predict locations of future refactoring based on the development history? In an empirical study of open source projects we found that attributes of software evolution data ...
Jacek Ratzinger, Thomas Sigmund, Peter Vorburger, ...
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
14 years 3 days ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
CGF
2010
105views more  CGF 2010»
13 years 5 months ago
Streaming-Enabled Parallel Dataflow Architecture for Multicore Systems
We propose a new framework design for exploiting multi-core architectures in the context of visualization dataflow systems. Recent hardware advancements have greatly increased the...
Huy T. Vo, Daniel K. Osmari, Brian Summa, Jo&atild...
LWA
2008
13 years 6 months ago
Rule-Based Information Extraction for Structured Data Acquisition using TextMarker
Information extraction is concerned with the location of specific items in (unstructured) textual documents, e.g., being applied for the acquisition of structured data. Then, the ...
Martin Atzmüller, Peter Klügl, Frank Pup...
GRAPHITE
2003
ACM
13 years 10 months ago
A domain-independent system for sketch recognition
Freehand sketching is a natural and powerful means of interpersonal communication. But to date, it still cannot be supported effectively by human-computer interface. In this paper...
Bo Yu, Shijie Cai