Sciweavers

726 search results - page 90 / 146
» From Anomaly Reports to Cases
Sort
View
REFSQ
2010
Springer
15 years 3 months ago
A Domain Ontology Building Process for Guiding Requirements Elicitation
[Context and motivation] In Requirements Management, ontologies are used to reconcile gaps in the knowledge and common understanding among stakeholders during requirement elicitati...
Inah Omoronyia, Guttorm Sindre, Tor Stålhane...
VLDB
1997
ACM
170views Database» more  VLDB 1997»
15 years 3 months ago
M-tree: An Efficient Access Method for Similarity Search in Metric Spaces
A new access method, called M-tree, is proposed to organize and search large data sets from a generic "metric space", i.e. where object proximity is only defined by a di...
Paolo Ciaccia, Marco Patella, Pavel Zezula
AUSDM
2008
Springer
212views Data Mining» more  AUSDM 2008»
15 years 1 months ago
Clustering and Classification of Maintenance Logs using Text Data Mining
Spreadsheets applications allow data to be stored with low development overheads, but also with low data quality. Reporting on data from such sources is difficult using traditiona...
Brett Edwards, Michael Zatorsky, Richi Nayak
CDC
2009
IEEE
164views Control Systems» more  CDC 2009»
15 years 29 days ago
Kalman filter based estimation of flow states in open channels using Lagrangian sensing
In this article, we investigate real-time estimation of flow states, average velocity and stage (water depth), in open channels using the measurements obtained from Lagrangian sens...
Mohammad Rafiee, Qingfang Wu, Alexandre M. Bayen
JCS
2002
115views more  JCS 2002»
14 years 11 months ago
Panoptis: Intrusion Detection Using a Domain-Specific Language
We describe the use of a domain-specific language (DSL) for expressing critical design values and constraints in an intrusion detection application. Through the use of this specia...
Diomidis Spinellis, Dimitris Gritzalis