Sciweavers

313 search results - page 21 / 63
» Building Credible Input Models
Sort
View
BPM
2006
Springer
119views Business» more  BPM 2006»
14 years 10 days ago
Business Process Design by View Integration
Even though the design of business processes most often has to consolidate the knowledge of several process stakeholders, this fact is utilized only to a limited extent by existing...
Jan Mendling, Carlo Simon
ICSE
2009
IEEE-ACM
13 years 6 months ago
Security Test Generation Using Threat Trees
Software security issues have been a major concern to the cyberspace community, so a great deal of research on security testing has been performed, and various security testing te...
Aaron Marback, Hyunsook Do, Ke He, Samuel Kondamar...
ISNN
2005
Springer
14 years 2 months ago
Feature Selection and Intrusion Detection Using Hybrid Flexible Neural Tree
Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything)...
Yuehui Chen, Ajith Abraham, Ju Yang
ICIP
2010
IEEE
13 years 6 months ago
A view-dependent adaptivity metric for real time mesh tessellation
Real-time tessellation methods offer the ability to upsample 3D surface meshes on the fly during rendering. This upsampling relies on 3 major steps. First, it requires a tessellat...
Tamy Boubekeur
ICPR
2006
IEEE
14 years 9 months ago
Graph-based transformation manifolds for invariant pattern recognition with kernel methods
We present here an approach for applying the technique of modeling data transformation manifolds for invariant learning with kernel methods. The approach is based on building a ke...
Alexei Pozdnoukhov, Samy Bengio