Sciweavers

431 search results - page 40 / 87
» The five orders of ignorance
Sort
View
NSPW
2004
ACM
15 years 5 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
PDC
2004
ACM
15 years 5 months ago
The weight of space: participatory design research for configuring habitable space for new arrival women in Hong Kong
When arriving to Hong Kong from China, the first difficulty of the new arrival women of the grassroots class is usually environmental stress. Their socio-economic situations often...
Jackie Yan-Chi Kwok
CIKM
2001
Springer
15 years 4 months ago
Approaches to Collection Selection and Results Merging for Distributed Information Retrieval
We have investigated two major issues in Distributed Information Retrieval (DIR), namely: collection selection and search results merging. While most published works on these two ...
Yves Rasolofo, Faiza Abbaci, Jacques Savoy
ISMIR
2001
Springer
146views Music» more  ISMIR 2001»
15 years 4 months ago
An Audio Front End for Query-by-Humming Systems
In this paper, the problem of processing audio signals is addressed in the context of query-by-humming systems. Since singing is naturally used as input, we aim to develop a front...
Emanuele Pollastri
ISCA
2000
IEEE
121views Hardware» more  ISCA 2000»
15 years 4 months ago
Memory access scheduling
The bandwidth and latency of a memory system are strongly dependent on the manner in which accesses interact with the “3-D” structure of banks, rows, and columns characteristi...
Scott Rixner, William J. Dally, Ujval J. Kapasi, P...