Sciweavers

8933 search results - page 1728 / 1787
» Usability over time
Sort
View
CORR
2008
Springer
128views Education» more  CORR 2008»
14 years 12 months ago
A Fast Generic Sequence Matching Algorithm
A string matching--and more generally, sequence matching--algorithm is presented that has a linear worst-case computing time bound, a low worst-case bound on the number of compari...
David R. Musser, Gor V. Nishanov
CORR
2008
Springer
116views Education» more  CORR 2008»
14 years 12 months ago
An Evidential Path Logic for Multi-Relational Networks
Multi-relational networks are used extensively to structure knowledge. Perhaps the most popular instance, due to the widespread adoption of the Semantic Web, is the Resource Descr...
Marko A. Rodriguez, Joe Geldart
CVIU
2008
296views more  CVIU 2008»
14 years 12 months ago
Image segmentation evaluation: A survey of unsupervised methods
Image segmentation is an important processing step in many image, video and computer vision applications. Extensive research has been done in creating many different approaches an...
Hui Zhang, Jason E. Fritts, Sally A. Goldman
DKE
2008
158views more  DKE 2008»
14 years 12 months ago
Integration and verification of semantic constraints in adaptive process management systems
Adaptivity in process management systems is key to their successful applicability in practice. Approaches have been already developed to ensure system correctness after arbitrary ...
Linh Thao Ly, Stefanie Rinderle, Peter Dadam
AAMAS
2006
Springer
14 years 12 months ago
CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing filesystem inspections to verify the content of security-critical files in order ...
Adam J. Rocke, Ronald F. DeMara
« Prev « First page 1728 / 1787 Last » Next »