Sciweavers

457 search results - page 89 / 92
» A Multiple Model Cost-Sensitive Approach for Intrusion Detec...
Sort
View
BPM
2009
Springer
340views Business» more  BPM 2009»
14 years 2 months ago
Abstractions in Process Mining: A Taxonomy of Patterns
ions in Process Mining: A Taxonomy of Patterns R.P. Jagadeesh Chandra Bose1,2 and Wil M.P. van der Aalst1 1 Department of Mathematics and Computer Science, University of Technology...
R. P. Jagadeesh Chandra Bose, Wil M. P. van der Aa...
BMCBI
2008
135views more  BMCBI 2008»
13 years 7 months ago
Inferring the role of transcription factors in regulatory networks
Background: Expression profiles obtained from multiple perturbation experiments are increasingly used to reconstruct transcriptional regulatory networks, from well studied, simple...
Philippe Veber, Carito Guziolowski, Michel Le Borg...
SIGMOD
2010
ACM
207views Database» more  SIGMOD 2010»
13 years 7 months ago
Leveraging spatio-temporal redundancy for RFID data cleansing
Radio Frequency Identification (RFID) technologies are used in many applications for data collection. However, raw RFID readings are usually of low quality and may contain many an...
Haiquan Chen, Wei-Shinn Ku, Haixun Wang, Min-Te Su...
ECCV
2010
Springer
13 years 11 months ago
Discriminative Mixture-of-Templates for Viewpoint Classification
Abstract. Object viewpoint classification aims at predicting an approximate 3D pose of objects in a scene and is receiving increasing attention. State-of-the-art approaches to view...
IJMMS
2007
166views more  IJMMS 2007»
13 years 7 months ago
Visualization of large networks with min-cut plots, A-plots and R-MAT
What does a ‘normal’ computer (or social) network look like? How can we spot ‘abnormal’ sub-networks in the Internet, or web graph? The answer to such questions is vital f...
Deepayan Chakrabarti, Christos Faloutsos, Yiping Z...