Sciweavers

1700 search results - page 318 / 340
» Introducing Business Process into Legacy Information Systems
Sort
View
ISVC
2007
Springer
15 years 3 months ago
A Scalable Aural-Visual Environment for Security Event Monitoring, Analysis, and Response
Abstract. Intrusion detection systems gather large quantities of host and network information in an attempt to detect and respond to attacks against an organization. The widely var...
Paul Z. Kolano
ECLIPSE
2006
ACM
15 years 3 months ago
Guidance through active concerns
Producing usable documentation has always been a tedious task, and even communicating important knowledge about a system among collaborators is difficult. This paper describes an ...
Barthélémy Dagenais, Harold Ossher
74
Voted
VLDB
2004
ACM
127views Database» more  VLDB 2004»
15 years 3 months ago
Computing Frequent Itemsets Inside Oracle 10G
1 Frequent itemset counting is the first step for most association rule algorithms and some classification algorithms. It is the process of counting the number of occurrences of ...
Wei Li, Ari Mozes
100
Voted
CC
2003
Springer
15 years 2 months ago
Early Control of Register Pressure for Software Pipelined Loops
Abstract. The register allocation in loops is generally performed after or during the software pipelining process. This is because doing a conventional register allocation at firs...
Sid Ahmed Ali Touati, Christine Eisenbeis
WEBENG
2001
Springer
15 years 2 months ago
Web Engineering Resources
This paper introduces the Web Engineering Resources Portal (shortly WEP), as a basic Reference Model and Guide for the Web Engineers. WEP provides a general classification of Web E...