Sciweavers

1486 search results - page 181 / 298
» Firewall Rules Analysis
Sort
View
KDD
2002
ACM
149views Data Mining» more  KDD 2002»
16 years 4 months ago
A system for real-time competitive market intelligence
A method is described for real-time market intelligence and competitive analysis. News stories are collected online for a designated group of companies. The goal is to detect crit...
Sholom M. Weiss, Naval K. Verma
CHI
2005
ACM
16 years 4 months ago
Tool for accurately predicting website navigation problems, non-problems, problem severity, and effectiveness of repairs
The Cognitive Walkthrough for the Web (CWW) is a partially automated usability evaluation method for identifying and repairing website navigation problems. Building on five earlie...
Marilyn Hughes Blackmon, Muneo Kitajima, Peter G. ...
ICDAR
2009
IEEE
15 years 11 months ago
Scalable Feature Extraction from Noisy Documents
We cope with the metadata recognition in layoutoriented documents. We address the problem as a classification task and propose a method for automatic extraction of relevant featu...
Loïc Lecerf, Boris Chidlovskii
SEMCO
2009
IEEE
15 years 11 months ago
Using a Formal Language Constructs for Software Model Evolution
— In this paper we present an automated support for software model evolution using a formal language constructs. For this, we extended Object Constraint Language (OCL) with actio...
Samuel A. Ajila, Shahid Alam
WCRE
2009
IEEE
15 years 11 months ago
The Logical Modularity of Programs
Abstract—The principles and best practices of object oriented design require that modules in a program should match logical decomposition of the knowledge that the program implem...
Daniel Ratiu, Radu Marinescu, Jan Jürjens