Sciweavers

320 search results - page 24 / 64
» An approach for implicitly detecting information needs
Sort
View
CAISE
2009
Springer
13 years 11 months ago
Anomaly Detection Using Process Mining
Abstract. Recently, several large companies have been involved in financial scandals related to mismanagement, resulting in financial damages for their stockholders. In response, c...
Fábio de Lima Bezerra, Jacques Wainer, Wil ...
CIARP
2007
Springer
14 years 1 months ago
Human Detection in Indoor Environments Using Multiple Visual Cues and a Mobile Robot
In order to deploy mobile robots in social environments like indoor buildings, they need to be provided with perceptual abilities to detect people. In the computer vision literatur...
Stefan Pszczólkowski, Alvaro Soto
ADBIS
2010
Springer
174views Database» more  ADBIS 2010»
13 years 9 months ago
Exploiting the Semantics of Location Granules in Location-Dependent Queries
Abstract. The need for location-based services has motivated an important research effort in the efficient processing of location-dependent queries. Most of the existing approaches...
Carlos Bobed, Sergio Ilarri, Eduardo Mena
ICC
2009
IEEE
164views Communications» more  ICC 2009»
13 years 5 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
CONCUR
2000
Springer
14 years 23 hour ago
LP Deadlock Checking Using Partial Order Dependencies
Model checking based on the causal partial order semantics of Petri nets is an approach widely applied to cope with the state space explosion problem. One of the ways to exploit su...
Victor Khomenko, Maciej Koutny