Sciweavers

5339 search results - page 873 / 1068
» Controllable Delay-Insensitive Processes
Sort
View
HT
2005
ACM
15 years 10 months ago
Information visualization for an intrusion detection system
— Spatial hypertext was developed from studies of how humans deal with information overflow particularly in situations where data needed to be interpreted quickly. Intrusion det...
James Blustein, Ching-Lung Fu, Daniel L. Silver
HT
2005
ACM
15 years 10 months ago
Supporting the generation of argument structure within video sequences
We describe our approach to the automatic generation of argument structures in the domain of video documentaries. Our approach releases control of the final video sequencing from...
Stefano Bocconi, Frank Nack, Lynda Hardman
IMC
2005
ACM
15 years 10 months ago
Inferring and Debugging Path MTU Discovery Failures
If a host can send packets larger than an Internet path can forward, it relies on the timely delivery of Internet Control Message Protocol (ICMP) messages advising that the packet...
Matthew J. Luckie, Kenjiro Cho, Bill Owens
KCAP
2005
ACM
15 years 10 months ago
Knowledge base reuse through constraint relaxation
Effective reuse of Knowledge Bases (KBs) often entails the expensive task of identifying plausible KB-PS (Problem Solver) combinations. We propose a novel technique based on Const...
Tomas Eric Nordlander, Derek H. Sleeman, Ken N. Br...
KCAP
2005
ACM
15 years 10 months ago
Towards Browsing Distant Metadata Using Semantic Signatures
In this document, we describe a light-weighted ontology mediation method that allows users to send semantic queries to distant data repositories to browse for learning object meta...
Andrew Choi, Marek Hatala