Sciweavers

2841 search results - page 72 / 569
» A Call to Order
Sort
View
ISCNZ
1996
IEEE
15 years 2 months ago
Tabular application development
The purpose of this paper is to introduce the use of an object-oriented methodology called TAD in the field of business process reengineering. TAD methodology consists of six phas...
Talib Damij
EWCBR
2004
Springer
15 years 1 months ago
Justification-Based Case Retention
Abstract. A CBR system needs a good case retention strategy to decide which cases to incorporate into the case base in order to maximize the performance of the system. In this work...
Santiago Ontañón, Enric Plaza
ICMI
2000
Springer
104views Biometrics» more  ICMI 2000»
15 years 1 months ago
Jacob - An Animated Instruction Agent in Virtual Reality
Abstract. This paper gives an overview of the Jacob project. This project involves the construction of a 3D virtual environment where an animated human-like agent called Jacob give...
Marc Evers, Anton Nijholt
WCET
2008
14 years 11 months ago
Traces as a Solution to Pessimism and Modeling Costs in WCET Analysis
WCET analysis models for superscalar out-of-order CPUs generally need to be pessimistic in order to account for a wide range of possible dynamic behavior. CPU hardware modificatio...
Jack Whitham, Neil C. Audsley
ACSW
2006
14 years 11 months ago
Description of bad-signatures for network intrusion detection
Today, a computer network is under constant assault from attacks. In Computer Science, NIDS are used in order to protect a computer network against these intrusions. These systems...
Michael Hilker, Christoph Schommer