Sciweavers

776 search results - page 116 / 156
» Conceptual Patterns for Reuse in Information Systems Analysi...
Sort
View
WWW
2006
ACM
16 years 1 months ago
Temporal rules for mobile web personalization
Many systems use past behavior, preferences and environmental factors to attempt to predict user navigation on the Internet. However we believe that many of these models have shor...
Martin Halvey, Mark T. Keane, Barry Smyth
128
Voted
AMDO
2000
Springer
15 years 4 months ago
Matching a Human Walking Sequence with a VRML Synthetic Model
- In this paper we present a specific matching technique based on basic motor patterns between two image sequences taken from different view points and a VRML synthetic human model...
Jose Maria Buades Rubio, Ramon Mas, Francisco J. P...
80
Voted
IH
2004
Springer
15 years 5 months ago
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures
A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supple...
Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Betta...
AUSDM
2006
Springer
124views Data Mining» more  AUSDM 2006»
15 years 4 months ago
Analyzing Harmonic Monitoring Data Using Data Mining
Harmonic monitoring has become an important tool for harmonic management in distribution systems. A comprehensive harmonic monitoring program has been designed and implemented on ...
Ali Asheibi, David Stirling, Danny Soetanto
HICSS
2002
IEEE
148views Biometrics» more  HICSS 2002»
15 years 5 months ago
Barriers to a Wide-Area Trusted Network Early Warning System for Electric Power Disturbances
It is apparent that perturbations of the North American electric power grid follow the patterns and characteristics of Self Organized Critical (SOC) systems. Published studies sho...
Paul W. Oman, Jeff Roberts