Sciweavers

975 search results - page 127 / 195
» Applying Patterns during Business Process Modeling
Sort
View
ACSC
2003
IEEE
14 years 3 months ago
A Practical Method to Counteract Denial of Service Attacks
Today distributed denial of service (DDoS) attacks are causing major problems to conduct online business over the Internet. Recently several schemes have been proposed on how to p...
Udaya Kiran Tupakula, Vijay Varadharajan
ADAEUROPE
2010
Springer
13 years 8 months ago
Scheduling Configuration of Real-Time Component-Based Applications
Abstract: This paper proposes a strategy to manage the schedulability of realtime component-based applications that is fully compatible with the concept of component viewed as a re...
Patricia López Martínez, Laura Barro...
NC
2008
120views Neural Networks» more  NC 2008»
13 years 10 months ago
Combining self-healing and proofreading in self-assembly
Molecular self-assembly is a promising approach to bottom-up fabrication of complex structures. A major impediment to the practical use of self-assembly to create complex structure...
David Soloveichik, Matthew Cook, Erik Winfree
CVPR
2009
IEEE
15 years 5 months ago
Multi-Camera Activity Correlation Analysis
We propose a novel approach for modelling correlations between activities in a busy public space captured by multiple non-overlapping and uncalibrated cameras. In our approach, ...
Chen Change Loy (Queen Mary, University of London)...
IJCNLP
2005
Springer
14 years 3 months ago
A Chunking Strategy Towards Unknown Word Detection in Chinese Word Segmentation
This paper proposes a chunking strategy to detect unknown words in Chinese word segmentation. First, a raw sentence is pre-segmented into a sequence of word atoms 1 using a maximum...
Guodong Zhou