Sciweavers

8647 search results - page 452 / 1730
» The Container Selection Problem
Sort
View
IAW
2003
IEEE
15 years 10 months ago
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures
Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...
Fabio A. González, Jonatan Gómez, Ma...
ICDAR
2003
IEEE
15 years 10 months ago
Improved Nearest Neighbor Based Approach to Accurate Document Skew Estimation
The nearest-neighbor based document skew detection methods do not require the presence of a predominant text area, and are not subject to skew angle limitation. However, the accur...
Yue Lu, Chew Lim Tan
129
Voted
WSE
2003
IEEE
15 years 10 months ago
Considering Browser Interaction in Web Application Testing
As web applications evolves, their structure may become more and more complex. Thus, systematic approaches/methods for web application testing are needed. Existing methods take in...
Giuseppe A. Di Lucca, Massimiliano Di Penta
109
Voted
DNA
2003
Springer
101views Bioinformatics» more  DNA 2003»
15 years 10 months ago
A Lab-on-a-Chip Module for Bead Separation in DNA-Based Concept Learning
Affinity separation with magnetic beads is an important and widely used technique for DNA computing. We have designed and implemented an experimental lab-on-a-chip module for affin...
Hee-Woong Lim, Hae-Man Jang, Sung-Mo Ha, Young-Gyu...
CHI
2000
ACM
15 years 9 months ago
Tagged handles: merging discrete and continuous manual control
Discrete and continuous modes of manual control are fundamentally different: buttons select or change state, while handles persistently modulate an analog parameter. User interfac...
Karon E. MacLean, Scott S. Snibbe, Golan Levin