Sciweavers

1349 search results - page 109 / 270
» Towards a theory of events
Sort
View
VIROLOGY
2010
162views more  VIROLOGY 2010»
14 years 11 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé
CSCW
2006
ACM
15 years 7 months ago
Actor centrality correlates to project based coordination
In this study, we draw on network centrality concepts and coordination theory to understand how project team members interact when working towards a common goal. A text-mining app...
Liaquat Hossain, Andrè Wu, Kon Shing Kennet...
EMSOFT
2005
Springer
15 years 6 months ago
Tag machines
Heterogeneity is a challenge to overcome in the design of embedded systems. We presented in the recent past a theory for the composition of heterogeneous components based on tagge...
Albert Benveniste, Benoît Caillaud, Luca P. ...
ECIS
2001
15 years 2 months ago
Gender, Emancipation and Critical Information Systems
This paper addresses ways in which theorizing gender may be important in forming an understanding of the topic of emancipation which is central to the new critical information sys...
Alison E. Adam
JMLR
2010
92views more  JMLR 2010»
14 years 8 months ago
Posterior distributions are computable from predictive distributions
As we devise more complicated prior distributions, will inference algorithms keep up? We highlight a negative result in computable probability theory by Ackerman, Freer, and Roy (...
Cameron E. Freer, Daniel M. Roy