Sciweavers

571 search results - page 88 / 115
» New Event-Processing Design Patterns Using CEP
Sort
View
NSPW
2004
ACM
15 years 9 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
ICMI
2003
Springer
133views Biometrics» more  ICMI 2003»
15 years 9 months ago
Mouthbrush: drawing and painting by hand and mouth
We present a novel multimodal interface which permits users to draw or paint using coordinated gestures of hand and mouth. A headworn camera captures an image of the mouth and the...
Chi-Ho Chan, Michael J. Lyons, Nobuji Tetsutani
ESWS
2010
Springer
15 years 9 months ago
Put in Your Postcode, Out Comes the Data: A Case Study
A single datum or a set of a categorical data has little value on its own. Combinations of disparate sets of data increase the value of those data sets and helps to discover intere...
Tope Omitola, Christos L. Koumenides, Igor O. Popo...
ICS
1999
Tsinghua U.
15 years 8 months ago
Symmetry and performance in consistency protocols
A consistency protocol can be termed symmetric if all processors are treated identically when they access common resources. By contrast, asymmetric protocols usually assign a home...
Peter J. Keleher
172
Voted
CIKM
2010
Springer
15 years 26 days ago
Crawling the web for structured documents
Structured Information Retrieval is gaining a lot of interest in recent years, as this kind of information is becoming an invaluable asset for professional communities such as Sof...
Julián Urbano, Juan Loréns, Yorgos A...