Sciweavers

2309 search results - page 382 / 462
» Patterns for Technology Companies
Sort
View
ISW
2004
Springer
15 years 9 months ago
A Model for the Semantics of Attack Signatures in Misuse Detection Systems
Misuse Detection systems identify evidence of attacks by searching for patterns of known attacks (signatures). A main problem in this context is the modeling and specification of a...
Michael Meier
NIME
2004
Springer
110views Music» more  NIME 2004»
15 years 9 months ago
You're The Conductor: A Realistic Interactive Conducting System for Children
This paper describes the first system designed to allow children to conduct an audio and video recording of an orchestra. No prior music experience is required to control the orc...
Eric Lee, Teresa Marrin Nakra, Jan Borchers
SPATIALCOGNITION
2004
Springer
15 years 9 months ago
Perceptually Induced Distortions in Cognitive Maps
Cities on a map that are directly connected by a route are judged closer than unconnected cities. This route effect has been attributed to memory distortions induced by the integra...
Alexander Klippel, Lothar Knuf, Bernhard Hommel, C...
WAIM
2004
Springer
15 years 9 months ago
Learning-Based Top-N Selection Query Evaluation over Relational Databases
A top-N selection query against a relation is to find the N tuples that satisfy the query condition the best but not necessarily completely. In this paper, we propose a new method ...
Liang Zhu, Weiyi Meng
WEBI
2004
Springer
15 years 9 months ago
An Integrated Approach to Discovery in Complex Information Spaces
As the amount of available data continues to increase, more and more effective means for discovering important patterns and relationships within that data are required. Although t...
Daryl H. Hepting, Cory J. Butz