Sciweavers

391 search results - page 47 / 79
» Automatically Extracting Structure and Data from Business Re...
Sort
View
TON
2008
102views more  TON 2008»
15 years 3 months ago
Internet traffic behavior profiling for network security monitoring
Abstract--Recent spates of cyber-attacks and frequent emergence of applications affecting Internet traffic dynamics have made it imperative to develop effective techniques that can...
Kuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya
BMCBI
2005
143views more  BMCBI 2005»
15 years 3 months ago
Evaluation of BioCreAtIvE assessment of task 2
Background: Molecular Biology accumulated substantial amounts of data concerning functions of genes and proteins. Information relating to functional descriptions is generally extr...
Christian Blaschke, Eduardo Andrés Le&oacut...
ACL
2010
15 years 1 months ago
Hierarchical Search for Word Alignment
We present a simple yet powerful hierarchical search algorithm for automatic word alignment. Our algorithm induces a forest of alignments from which we can efficiently extract a r...
Jason Riesa, Daniel Marcu
DSOM
1999
Springer
15 years 8 months ago
Derivation of Backup Service Management Applications from Service and System Models
The backup of large data sets is preferably performed automatically outside of regular working hours. In highly structured computer networks, however, faults and exceptions may rel...
Ingo Lück, Marcus Schönbach, Arnulf Mest...
BPM
2009
Springer
258views Business» more  BPM 2009»
15 years 10 months ago
Activity Mining by Global Trace Segmentation
Process Mining is a technology for extracting non-trivial and useful information from execution logs. For example, there are many process mining techniques to automatically discove...
Christian W. Günther, Anne Rozinat, Wil M. P....