Sciweavers

975 search results - page 176 / 195
» Applying Patterns during Business Process Modeling
Sort
View
SIGMETRICS
2008
ACM
115views Hardware» more  SIGMETRICS 2008»
13 years 8 months ago
Densification arising from sampling fixed graphs
During the past decade, a number of different studies have identified several peculiar properties of networks that arise from a diverse universe, ranging from social to computer n...
Pedram Pedarsani, Daniel R. Figueiredo, Matthias G...
INFOCOM
2000
IEEE
14 years 1 months ago
Optimal Streaming of Layered Video
Abstract—This paper presents a model and theory for streaming layered video. We model the bandwidth available to the streaming application as a stochastic process whose statistic...
Despina Saparilla, Keith W. Ross
SIGIR
2011
ACM
12 years 11 months ago
The economics in interactive information retrieval
Searching is inherently an interactive process usually requiring numerous iterations of querying and assessing in order to find the desired amount of relevant information. Essent...
Leif Azzopardi
BMCBI
2010
136views more  BMCBI 2010»
13 years 8 months ago
Bias correction and Bayesian analysis of aggregate counts in SAGE libraries
Background: Tag-based techniques, such as SAGE, are commonly used to sample the mRNA pool of an organism's transcriptome. Incomplete digestion during the tag formation proces...
Russell L. Zaretzki, Michael A. Gilchrist, William...
DMIN
2006
141views Data Mining» more  DMIN 2006»
13 years 10 months ago
Extracting Forensic Explanation from Intrusion Alerts
Since it is desirable for an intrusion detection system to be operated with the real time performance, it is not unusual for an intrusion detection engine to perform a "lazy ...
Bon Sy, Negmat Mullodzhanov