Sciweavers

5970 search results - page 911 / 1194
» Management Information Model Engineering
Sort
View
ISI
2004
Springer
15 years 10 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
221
Voted
MM
2003
ACM
168views Multimedia» more  MM 2003»
15 years 10 months ago
Interacting with audio streams for entertainment and communication
We present a new model of interactive audio for entertainment and communication. A new device called the DJammer and its associated technologies are described. The DJammer introdu...
Mat C. Hans, Mark T. Smith
145
Voted
CIKM
2001
Springer
15 years 9 months ago
Improved String Matching Under Noisy Channel Conditions
Many document-based applications, including popular Web browsers, email viewers, and word processors, have a ‘Find on this Page’ feature that allows a user to find every occur...
Kevyn Collins-Thompson, Charles Schweizer, Susan T...
ER
1998
Springer
106views Database» more  ER 1998»
15 years 9 months ago
Chrono: A Conceptual Design Framework for Temporal Entities
Abstract. Database applications are frequently faced with the necessity of representing time varying information and, particularly in the management of information systems, a few k...
Sonia Bergamaschi, Claudio Sartori
SIGIR
2010
ACM
15 years 9 months ago
Where to start filtering redundancy?: a cluster-based approach
Novelty detection is a difficult task, particularly at sentence level. Most of the approaches proposed in the past consist of re-ordering all sentences following their novelty sco...
Ronald T. Fernández, Javier Parapar, David ...