Sciweavers

2740 search results - page 327 / 548
» A Model-Based Approach To Requirements Analysis
Sort
View
150
Voted
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
16 years 3 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
227
Voted
ICPR
2010
IEEE
1103views Computer Vision» more  ICPR 2010»
15 years 10 months ago
Fast Logo Detection and Recognition in Document Images
The scientific significance of automatic logo detection and recognition is more and more growing because of the increasing requirements of intelligent document image analysis an...
Zhe Li, Matthias Schulte-Austum, Martin Neschen
113
Voted
CISIS
2009
IEEE
15 years 10 months ago
Integration of Shareable Containers with Distributed Hash Tables for Storage of Structured and Dynamic Data
Structured, spatial-temporal data arises in many applications areas such as transportation, sensor networks or mobile services. Peer to peer networks are the natural choice for th...
eva Kühn, Richard Mordinyi, Hannu-D. Goiss, T...
110
Voted
DATE
2009
IEEE
120views Hardware» more  DATE 2009»
15 years 10 months ago
Overcoming limitations of the SystemC data introspection
—Today verification, testing and debugging of SystemC models can be applied at an early stage in the design process. To support these techniques gaining required information of ...
Christian Genz, Rolf Drechsler
112
Voted
IAT
2009
IEEE
15 years 10 months ago
Opinion Mining on Newspaper Quotations
— Opinion mining is the task of extracting from a set of documents opinions expressed by a source on a specified target. This article presents a comparative study on the methods ...
Alexandra Balahur, Ralf Steinberger, Erik Van der ...