Sciweavers

2826 search results - page 448 / 566
» A resource-based analysis of IT sourcing
Sort
View
ICADL
2004
Springer
162views Education» more  ICADL 2004»
15 years 7 months ago
Character Region Identification from Cover Images Using DTT
A robust character region identification approach is proposed here to deal with cover images using a differential top-hat transformation (DTT). The DTT is derived from morphologica...
Lixu Gu
ICCS
2004
Springer
15 years 7 months ago
Improving Generalization Level in UML Models Iterative Cross Generalization in Practice
FCA has been successfully applied to software engineering tasks such as source code analysis and class hierarchy re-organization. Most notably, FCA hematics behind the mechanism of...
Michel Dao, Marianne Huchard, Mohamed Rouane Hacen...
PROMAS
2004
Springer
15 years 7 months ago
Goal Representation for BDI Agent Systems
Abstract. Agent-oriented system development aims to simplify the conn of complex systems by introducing a natural abstraction layer on top of the object-oriented paradigm composed ...
Lars Braubach, Alexander Pokahr, Daniel Moldt, Win...
131
Voted
RT
2004
Springer
15 years 7 months ago
Light Space Perspective Shadow Maps
In this paper, we present a new shadow mapping technique that improves upon the quality of perspective and uniform shadow maps. Our technique uses a perspective transform specifi...
Michael Wimmer, Daniel Scherzer, Werner Purgathofe...
EUROSEC
2010
ACM
15 years 7 months ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani