Sciweavers

2309 search results - page 54 / 462
» Patterns for Technology Companies
Sort
View
DSS
2007
111views more  DSS 2007»
14 years 12 months ago
Applying question answering technology to locating malevolent online content
We have empirically compared two classes of technologies capable of locating potentially malevolent online content: 1) popular keyword searching, currently widely used by law enfo...
Dmitri Roussinov, Jose Antonio Robles-Flores
ESE
2002
103views Database» more  ESE 2002»
14 years 11 months ago
A Review of Experimental Investigations into Object-Oriented Technology
In recent years there has been a growing interest in empirically investigating object-oriented technology (OOT). Much of this empirical work has been experimental in nature. This ...
Ignatios S. Deligiannis, Martin J. Shepperd, Steve...
CHI
2004
ACM
16 years 7 days ago
Dealing with mobile conversations in public places: some implications for the design of socially intrusive technologies
In this paper we describe the results of a study investigating the behaviour and views of bystanders in response to a proximal mobile telephone conversation by a third party. Anal...
Steve Love, Mark Perry
IEAAIE
2009
Springer
15 years 6 months ago
Using Genetic Process Mining Technology to Construct a Time-Interval Process Model
Nowadays, some process information is represented by a process model. To understand process executed in many activities, process mining technologies are now extensively studied to...
Chieh-Yuan Tsai, I-Ching Chen
89
Voted
GLOBECOM
2007
IEEE
15 years 6 months ago
Performing Packet Content Inspection by Longest Prefix Matching Technology
—This article presents a novel mechanism to perform packet content inspection by longest prefix matching (LPM) technology. It is done by transforming the automaton-based state ta...
Nen-Fu Huang, Yen-Ming Chu, Yen-Min Wu, Chia-Wen H...