Sciweavers

2520 search results - page 467 / 504
» Knowledge Management Challenges in Knowledge Discovery Syste...
Sort
View
ESORICS
2004
Springer
15 years 3 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
BCSHCI
2008
14 years 11 months ago
Low cost prototyping: part 2, or how to apply the thinking-aloud method efficiently
Customer satisfaction with regard to user interfaces becomes increasingly more important and is, eventually, decisive for the selection of systems within a competitive market. End...
Andreas Holzinger, Stephen Brown
BMCBI
2007
207views more  BMCBI 2007»
14 years 9 months ago
Analyzing in situ gene expression in the mouse brain with image registration, feature extraction and block clustering
Background: Many important high throughput projects use in situ hybridization and may require the analysis of images of spatial cross sections of organisms taken with cellular lev...
Manjunatha Jagalur, Chris Pal, Erik G. Learned-Mil...
TVLSI
2008
157views more  TVLSI 2008»
14 years 9 months ago
Scalable QoS-Aware Memory Controller for High-Bandwidth Packet Memory
This paper proposes a high-performance scalable quality-of-service (QoS)-aware memory controller for the packet memory where packet data are stored in network routers. A major chal...
Hyuk-Jun Lee, Eui-Young Chung
EWCBR
2004
Springer
15 years 3 months ago
Software Design Retrieval Using Bayesian Networks and WordNet
The complexity of software systems makes design reuse a necessary task in the software development process. CASE tools can provide cognitive assistance in this task, helping the so...
Paulo Gomes