Sciweavers

1521 search results - page 80 / 305
» Role analysis
Sort
View
61
Voted
CHI
2005
ACM
15 years 12 months ago
Design and analysis of delimiters for selection-action pen gesture phrases in scriboli
We present a quantitative analysis of delimiters for pen gestures. A delimiter is "something different" in the input stream that a computer can use to determine the stru...
François Guimbretière, Gonzalo Ramos...
PERCOM
2008
ACM
15 years 11 months ago
Stability and Delay Analysis for Multi-Hop Single-Sink Wireless Sensor Networks
Wireless sensor networks are commonly used to monitor and control the physical world. To provide a meaningful service such as disaster and emergency surveillance, meeting real-tim...
Muhammad Farukh Munir, Arzad Alam Kherani, Fethi F...
ICPR
2008
IEEE
15 years 6 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi
ICSEA
2007
IEEE
15 years 5 months ago
The Knowledge Based Software Process Improvement Program: A Rational Analysis
Knowledge management is the key area of focus in the present information technology scenario. It forms a basis to derive standards and models and steers organizations through an e...
K. Alagarsamy, S. Justus, K. Iyakutti
HOLOMAS
2007
Springer
15 years 5 months ago
A Holonic Metamodel for Agent-Oriented Analysis and Design
Abstract. Holonic multiagent systems (hmas) offers a promising software engineering approach for developing applications in complex domains characterized by a hierarchical structu...
Massimo Cossentino, Nicolas Gaud, Stéphane ...