Search results

Jump to: navigation, search
  • analysis/design methodologies, process and process models for - norms and normative behavior
    10 KB (1,371 words) - 16:14, 12 November 2020
  • All the complex systems depend on software that controls the behavior of individual components and * 9. Network Control and Performance Analysis
    13 KB (1,706 words) - 16:34, 27 December 2015
  • ...ress in different advanced mechanisms and theoretical foundations. The gap analysis aims at mechanisms and features concerning the Internet itself, as well as Optimization in P2P/CDN networks: peer placement for streaming P2P, analysis of P2P networks
    11 KB (1,385 words) - 17:48, 14 October 2008
  • | Title = AAAI Spring 2009 Symposium on Human Behavior Modeling The '''AAAI 2009 Spring Symposium on Human Behavior Modeling''' will explore
    2 KB (204 words) - 12:45, 27 December 2015
  • * Neural foundations of intelligent behavior; * Brain data collection, pre-processing, management, and analysis methodologies;
    6 KB (692 words) - 23:59, 30 May 2016
  • ...length papers, which are selected by the program committee after in-depth analysis and discussion. A complementary set of short paper presentations and demos Modeling and prediction of user behavior
    8 KB (1,111 words) - 19:27, 11 February 2009
  • * Semantic Analysis of Multimedia ** Knowledge assisted multimedia analysis
    4 KB (490 words) - 16:48, 15 October 2008
  • grams, services and, even, network behavior. This connection be- tween content and the user is made via (1) Semantic Analysis,
    4 KB (570 words) - 11:08, 26 July 2016
  • ...irst phases of the product life cycle: design, engineering, simulation and analysis. Virtual Prototypes enable early stage planning and validation resulting in ...ring exists in a great variety in terms of different models (shape models, behavior models, ...), data (simulation data, product data, ...) and their dependenc
    4 KB (512 words) - 16:46, 16 December 2020
  • flexible problem solving and social behavior. By participating in the - Social Network Analysis on the social web
    7 KB (950 words) - 23:14, 14 October 2008
  • focusing on Internet measurement and analysis, building on the success give insight into Internet structure and behavior. Examples of relevant
    3 KB (313 words) - 23:15, 14 October 2008
  • Computer Vision and Image Analysis Motion Analysis
    4 KB (438 words) - 23:17, 14 October 2008
  • o capturing user behavior * Performance measurement and analysis
    4 KB (449 words) - 23:18, 14 October 2008
  • • Advances in Modeling, Analysis, and Simulation of Manufacturing Processes • Materials Behavior
    4 KB (424 words) - 10:39, 24 June 2011
  • exciting application area are the analysis of this new data, then the * network analysis of social resources sharing systems
    5 KB (646 words) - 23:19, 14 October 2008
  • exciting and future-oriented topics of plagiarism analysis, authorship Plagiarism analysis:
    5 KB (587 words) - 23:19, 14 October 2008
  • * Intrusion detection, detection of malicious behavior * Anonymity, prevention of traffic analysis
    2 KB (291 words) - 23:19, 14 October 2008
  • ...y-related systems; however, these claims are often made without a rigorous analysis of the human factors involved. Accurate identification and implementation o Formal methods to specify systems' behavior
    11 KB (1,492 words) - 23:26, 14 October 2008
  • o Behavior and modeling of complex adaptive systems o Information mining, statistical analysis of data from complex systems
    3 KB (378 words) - 23:26, 14 October 2008
  • ...g, geometric modeling, and geometric algorithms and computation in design, analysis and manufacturing, as well as in biomedical, geophysical, digital entertain ...to): biomedical and imaging applications, physical simulation and design, analysis, and manufacturing.
    5 KB (715 words) - 23:27, 14 October 2008
  • ...g, geometric modeling, and geometric algorithms and computation in design, analysis and manufacturing, as well as in biomedical, geophysical, digital entertain ...to): biomedical and imaging applications, physical simulation and design, analysis, and manufacturing.
    5 KB (733 words) - 23:27, 14 October 2008
  • embedded applications, and the behavior of many of these applications - Compiler analysis and implementation techniques
    6 KB (847 words) - 23:30, 14 October 2008
  • behavior based on the component behavior. To capture the intricacy of framework for the specification and analysis of rich interfaces is
    4 KB (537 words) - 23:30, 14 October 2008
  • ...ties. Social computing facilitates behavioral modeling in model building, analysis, pattern mining, and prediction. Numerous interdisciplinary and interdepend * Social network analysis and mining
    4 KB (511 words) - 23:31, 14 October 2008
  • * Empirical studies on collaboration and information behavior in development teams. * Scientific analysis of the relation between methods/processes, tools and collaborative developm
    3 KB (341 words) - 01:15, 31 May 2012
  • characterising the behavior and determining the properties of systems. They and the methodologies and tools for the analysis and verification of system
    6 KB (823 words) - 14:28, 14 December 2008
  • including identification, analysis, extraction, mining, transformation and NE Analysis
    10 KB (1,242 words) - 12:58, 18 January 2009
  • Behavior-building, cognitive modeling, data collection and encoding ...ing, animation/camera control, tactical/strategic decision making, terrain analysis
    8 KB (1,134 words) - 17:06, 27 February 2009
  • · Malicious Behavior Detection and Analysis · Security Protocols Analysis, Design, and Proof
    4 KB (485 words) - 17:07, 27 February 2009
  • + Detection and analysis + Automated behavior model generation
    8 KB (1,020 words) - 17:07, 27 February 2009
  • - privacy audits and risk analysis - analysis of network and security protocols
    12 KB (1,690 words) - 17:08, 27 February 2009
  • understanding and analysis of existing workloads. Whether they are PDAs, * Characterization of OS, Virtual Machine, middleware and library behavior
    4 KB (589 words) - 17:08, 27 February 2009
  • ...analyze Internet measurements, or give insight into Internet structure and behavior. Examples of relevant topics are: * Internet traffic analysis
    6 KB (774 words) - 17:08, 27 February 2009
  • ...ibutions addressing the challenges of large-scale search and user behavior analysis are especially welcome.''
    780 bytes (97 words) - 17:42, 7 March 2020
  • * Multimodal content analysis and retrieval * Studies of information-seeking behavior among image/video users
    3 KB (439 words) - 06:47, 17 April 2020
  • ⑵ Strategic Management Tools and Application Analysis 2.Marketing⑴ Marketing Models and Case Analysis
    2 KB (192 words) - 11:36, 2 August 2009
  • • Intrusion and cybersecurity threat detection and analysis<br> • Crime analysis and prevention<br>
    4 KB (429 words) - 08:55, 1 August 2019
  • ...forum for scientists, engineers and practitioners interested in the study, analysis, design, modeling and implementation of evolvable systems, both theoretical › Co-evolution and collective behavior
    2 KB (260 words) - 19:16, 16 February 2010
  • * Security analysis * Malware analysis
    3 KB (343 words) - 16:31, 6 May 2020
  • * Analysis of neurophysiological and neuroanatomical data * Models of conditioning, reward and behavior
    5 KB (574 words) - 15:58, 6 March 2020
  • ...een them. They can be used to perceive the network conditions, or the user behavior, in order to dynamically plan, adapt, decide, take the appropriate actions, ...rchers are encouraged to submit papers focused on the design, development, analysis or optimization of smart communication protocols or algorithms at any commu
    6 KB (833 words) - 15:16, 24 September 2020
  • * Texture Models, Analysis, and Synthesis * Social Behavior
    6 KB (725 words) - 11:44, 1 July 2011
  • ...ure, society and technology– can be utilized in the design, modeling and analysis of current and future computing systems. Being a particularly promising dom * Applications of percolation theory to the analysis of robustness in (interdependent) communication networks
    6 KB (766 words) - 11:19, 26 October 2011
  • Design, implementation and analysis of security hardware, i.e., hardware with cryptographic and security functi Effects of trustworthy systems upon user, corporate, and governmental behavior
    4 KB (451 words) - 12:27, 30 November 2011
  • ...ns. Here, a challenge is often to predict and control the resulting global behavior. • Self-* Behavior in Communication Networks
    7 KB (969 words) - 04:02, 17 January 2012
  • * Enterprise Architecture Design, Modeling, Analysis, Development * Business Collaboration Architecture Design, Modeling, Analysis, Development
    10 KB (1,232 words) - 18:10, 5 March 2012
  • * Document (Text) Analysis * Citation Analysis and Scientometrics
    6 KB (825 words) - 10:31, 24 March 2020
  • ...ithm design and analysis, economic implications, and in-depth experimental analysis of accuracy and performance. * Query analysis and query processing
    4 KB (508 words) - 15:49, 14 May 2020
  • ...theories and foundations, algorithms and applications, and evaluation and analysis. The conference and program chairs invite those working in areas related to * Queries and Query Analysis (e.g., query intent, query understanding, query suggestion and prediction,
    8 KB (1,024 words) - 09:57, 13 May 2020
  • Texture Models, Analysis, and Synthesis Social Behavior
    6 KB (726 words) - 16:22, 19 June 2012

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)