Sciweavers

736 search results - page 111 / 148
» Classification with Scattering Operators
Sort
View
CHI
2009
ACM
14 years 2 months ago
'Broken Expectations' from a global business perspective
Especially in the past few years, there has been an increase in the rejection rate of interactive consumer electronics products in the field, not due to broken hardware or softwar...
Aylin Koca, Evangelos Karapanos, Aarnout Brombache...
ISMIS
2009
Springer
14 years 2 months ago
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining
Workflow mining aims to find graph-based process models based on activities, emails, and various event logs recorded in computer systems. Current workflow mining techniques mainly ...
Liqiang Geng, Scott Buffett, Bruce Hamilton, Xin W...
ICMCS
2007
IEEE
175views Multimedia» more  ICMCS 2007»
14 years 2 months ago
Clicker - An IPTV Remote Control in Your Cell Phone
This paper investigates a novel concept of providing seamless control and portability of an IPTV viewing session. A solution employing a middleware system, a secure hardware token...
Rittwik Jana, Yih-Farn Chen, David C. Gibbon, Yenn...
ICARIS
2007
Springer
14 years 1 months ago
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Comp
Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...
DASC
2006
IEEE
14 years 1 months ago
Assessing Vulnerabilities in Apache and IIS HTTP Servers
We examine the feasibility of quantitatively characterizing the vulnerabilities in the two major HTTP servers. In particular, we investigate the applicability of quantitative empi...
Sung-Whan Woo, Omar H. Alhazmi, Yashwant K. Malaiy...