Sciweavers

1732 search results - page 181 / 347
» Knowledge-based organization evaluation
Sort
View
WSC
2007
15 years 6 months ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
CODES
2008
IEEE
15 years 6 months ago
A performance-oriented hardware/software partitioning for datapath applications
This article proposes a hardware/software partitioning method targeted to performance-constrained systems for datapath applications. Exploiting a platform based design, a Timed Pe...
Laura Frigerio, Fabio Salice
EVOW
2008
Springer
15 years 6 months ago
Artificial Creatures for Object Tracking and Segmentation
We present a study on the use of soft computing techniques for object tracking/segmentation in surveillance video clips. A number of artificial creatures, conceptually, "inhab...
Luca Mussi, Stefano Cagnoni
ACL
2008
15 years 6 months ago
An Entity-Mention Model for Coreference Resolution with Inductive Logic Programming
The traditional mention-pair model for coreference resolution cannot capture information beyond mention pairs for both learning and testing. To deal with this problem, we present ...
Xiaofeng Yang, Jian Su, Jun Lang, Chew Lim Tan, Ti...
APVIS
2007
15 years 6 months ago
Visualization and analysis of email networks
This paper presents various methods for visualization and analysis of email networks; visualization on the surface of a sphere to reveal communication patterns between different g...
Xiaoyan Fu, Seok-Hee Hong, Nikola S. Nikolov, Xiao...