Sciweavers

2309 search results - page 54 / 462
» Patterns for Technology Companies
Sort
View
DSS
2007
111views more  DSS 2007»
15 years 1 months ago
Applying question answering technology to locating malevolent online content
We have empirically compared two classes of technologies capable of locating potentially malevolent online content: 1) popular keyword searching, currently widely used by law enfo...
Dmitri Roussinov, Jose Antonio Robles-Flores
ESE
2002
103views Database» more  ESE 2002»
15 years 1 months ago
A Review of Experimental Investigations into Object-Oriented Technology
In recent years there has been a growing interest in empirically investigating object-oriented technology (OOT). Much of this empirical work has been experimental in nature. This ...
Ignatios S. Deligiannis, Martin J. Shepperd, Steve...
CHI
2004
ACM
16 years 2 months ago
Dealing with mobile conversations in public places: some implications for the design of socially intrusive technologies
In this paper we describe the results of a study investigating the behaviour and views of bystanders in response to a proximal mobile telephone conversation by a third party. Anal...
Steve Love, Mark Perry
IEAAIE
2009
Springer
15 years 8 months ago
Using Genetic Process Mining Technology to Construct a Time-Interval Process Model
Nowadays, some process information is represented by a process model. To understand process executed in many activities, process mining technologies are now extensively studied to...
Chieh-Yuan Tsai, I-Ching Chen
GLOBECOM
2007
IEEE
15 years 8 months ago
Performing Packet Content Inspection by Longest Prefix Matching Technology
—This article presents a novel mechanism to perform packet content inspection by longest prefix matching (LPM) technology. It is done by transforming the automaton-based state ta...
Nen-Fu Huang, Yen-Ming Chu, Yen-Min Wu, Chia-Wen H...