Sciweavers

2874 search results - page 479 / 575
» Intrusion Detection: Systems and Models
Sort
View
KBSE
2008
IEEE
15 years 6 months ago
Cleman: Comprehensive Clone Group Evolution Management
—Recent research results have shown more benefits of the management of code clones, rather than detecting and removing them. However, existing management approaches for code clo...
Tung Thanh Nguyen, Hoan Anh Nguyen, Nam H. Pham, J...
IJCNN
2007
IEEE
15 years 6 months ago
Analysis of mammogram using self-organizing neural networks based on spatial isomorphism
— The correct segmentation and measurement of mammography images is of fundamental importance for the development of automatic or computer-aided cancer detection systems. In this...
Aida A. Ferreira, Francisco Nascimento Jr., Ing Re...
ACII
2007
Springer
15 years 6 months ago
Textual Affect Sensing for Sociable and Expressive Online Communication
In this paper, we address the tasks of recognition and interpretation of affect communicated through text messaging. The evolving nature of language in online conversations is a ma...
Alena Neviarouskaya, Helmut Prendinger, Mitsuru Is...
PASTE
2005
ACM
15 years 5 months ago
An empirical framework for comparing effectiveness of testing and property-based formal analysis
Today, many formal analysis tools are not only used to provide certainty but are also used to debug software systems – a role that has traditional been reserved for testing tool...
Jeremy S. Bradbury, James R. Cordy, Jürgen Di...
HAPTICS
2003
IEEE
15 years 5 months ago
Performance and Co-Presence in Heterogeneous Haptic Collaboration
Based on a distributed architecture for real-time collection and broadcast of haptic information to multiple participants, heterogeneous haptic devices (the PHANToM and the CyberG...
Margaret McLaughlin, Gaurav S. Sukhatme, Wei Peng,...