Sciweavers

2211 search results - page 276 / 443
» Comparing Approaches to Implement Feature Model Composition
Sort
View
ICSOC
2007
Springer
14 years 3 months ago
BPEL4Job: A Fault-Handling Design for Job Flow Management
Workflow technology is an emerging paradigm for systematic modeling and orchestration of job flow for enterprise and scientific applications. This paper introduces BPEL4Job, a BPEL...
Wei Tan, Liana Fong, Norman Bobroff
CVPR
2003
IEEE
14 years 2 months ago
Deformable Pedal Curves with Application to Face Contour Extraction
Pedal curves are the loci of the feet of perpendiculars to the tangents of a fixed curve to a fixed point called the pedal point. By varying the location of the pedal point, def...
Fuzhen Huang, Jianbo Su
ORI
2008
69views more  ORI 2008»
13 years 9 months ago
Markov chain applications in the slot machine industry
One of the important sectors within gambling is that of gaming machines. This industry used to favour approaches based on long-run simulations or complete enumerations of all poss...
Noelia Oses
KDD
2006
ACM
162views Data Mining» more  KDD 2006»
14 years 9 months ago
Simultaneous record detection and attribute labeling in web data extraction
Recent work has shown the feasibility and promise of templateindependent Web data extraction. However, existing approaches use decoupled strategies ? attempting to do data record ...
Jun Zhu, Zaiqing Nie, Ji-Rong Wen, Bo Zhang, Wei-Y...
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 9 months ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan