Sciweavers

4349 search results - page 713 / 870
» A Comprehensive Process Model for Studying Software Process ...
Sort
View
ER
2004
Springer
90views Database» more  ER 2004»
15 years 3 months ago
WUML: A Web Usage Manipulation Language for Querying Web Log Data
In this paper, we develop a novel Web Usage Manipulation Language (WUML) which is a declarative language for manipulating Web log data. We assume that a set of trails formed by use...
Qingzhao Tan, Yiping Ke, Wilfred Ng
ISCIS
2004
Springer
15 years 3 months ago
Finding Breach Paths Using the Watershed Segmentation Algorithm in Surveillance Wireless Sensor Networks
Considering wireless sensor networks for border surveillance, one of the major concerns is sensing coverage. Breach probability can be used as a measure to analyze the tradeoffs a...
Ertan Onur, Cem Ersoy, Hakan Deliç, Lale Ak...
WEBI
2009
Springer
15 years 2 months ago
Detecting Changes over Time in a Knowledge Sharing Community
There is an establishing trend towards the socialization of the web. Virtual communities are becoming very popular web spaces for collaboration and knowledge sharing. However, stu...
Styliani Kleanthous, Vania Dimitrova
FPL
2006
Springer
103views Hardware» more  FPL 2006»
15 years 1 months ago
A System Design Methodology for Reducing System Integration Time and Facilitating Modular Design Verification
This paper provides a realistic case study of using the previously introduced SIMPPL system architectural model, which fixes the physical interface and communication protocols bet...
Lesley Shannon, Blair Fort, Samir Parikh, Arun Pat...
FSKD
2006
Springer
106views Fuzzy Logic» more  FSKD 2006»
15 years 1 months ago
Fuzzy Optimization for Security Sensors Deployment in Collaborative Intrusion Detection System
This paper argues about the deployment positions of Network-based Intrusion Detection System and suggests the "Distributed Network Security Sensors" distributed among the...
Chengchen Hu, Zhen Liu, Zhen Chen, Bin Liu