Sciweavers

77 search results - page 10 / 16
» Anomaly detection algorithms in logs of process aware system...
Sort
View
GECCO
2006
Springer
178views Optimization» more  GECCO 2006»
13 years 11 months ago
A dynamic approach to artificial immune systems utilizing neural networks
The purpose of this work is to propose an immune-inspired setup to use a self-organizing map as a computational model for the interaction of antigens and antibodies. The proposed ...
Stefan Schadwinkel, Werner Dilger
BPM
2006
Springer
153views Business» more  BPM 2006»
13 years 11 months ago
Decision Mining in ProM
Process-aware Information Systems typically log events (e.g., in transaction logs or audit trails) related to the actual business process executions. Proper analysis of these execu...
Anne Rozinat, Wil M. P. van der Aalst
JAIR
2010
181views more  JAIR 2010»
13 years 2 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
IWDW
2004
Springer
14 years 22 days ago
Watermarking System for QoS Aware Content Adaptation
Video transcoding technology is useful for seamless video service to guarantee quality of service (QoS). But video transcoding would distort the watermark signal embedded in the vi...
Tae Meon Bae, Seok Jun Kang, Yong Man Ro
BPM
2009
Springer
340views Business» more  BPM 2009»
14 years 2 months ago
Abstractions in Process Mining: A Taxonomy of Patterns
ions in Process Mining: A Taxonomy of Patterns R.P. Jagadeesh Chandra Bose1,2 and Wil M.P. van der Aalst1 1 Department of Mathematics and Computer Science, University of Technology...
R. P. Jagadeesh Chandra Bose, Wil M. P. van der Aa...