Sciweavers

984 search results - page 105 / 197
» ideas 2010
Sort
View
HAIS
2010
Springer
15 years 5 months ago
Incorporating Temporal Constraints in the Planning Task of a Hybrid Intelligent IDS
Abstract. Accurate and swift responses are crucial to Intrusion Detection Systems (IDSs), especially if automatic abortion mechanisms are running. In keeping with this idea, this w...
Álvaro Herrero, Martí Navarro, Vicen...
120
Voted
ICALP
2010
Springer
15 years 5 months ago
Network Design via Core Detouring for Problems without a Core
Some of the currently best-known approximation algorithms for network design are based on random sampling. One of the key steps of such algorithms is connecting a set of source nod...
Fabrizio Grandoni, Thomas Rothvoß
121
Voted
ICIAR
2010
Springer
15 years 5 months ago
Can Background Baroque Music Help to Improve the Memorability of Graphical Passwords?
Graphical passwords have been proposed as an alternative to alphanumeric passwords with their advantages in usability and security. However, they still tend to follow predictable p...
Haichang Gao, Xiuling Chang, Zhongjie Ren, Uwe Aic...
122
Voted
ICSE
2010
IEEE-ACM
15 years 5 months ago
An eclectic approach for change impact analysis
Change impact analysis aims at identifying software artifacts being affected by a change. In the past, this problem has been addressed by approaches relying on static, dynamic, a...
Michele Ceccarelli, Luigi Cerulo, Gerardo Canfora,...
100
Voted
IPMU
2010
Springer
15 years 5 months ago
Plateau Regions: An Implementation Concept for Fuzzy Regions in Spatial Databases and GIS
Abstract. Many geographical applications need to model spatial phenomena with vague or indeterminate boundaries and interiors. A popular paradigm adopted by the GIS community for t...
Virupaksha Kanjilal, Hechen Liu, Markus Schneider