Sciweavers

1980 search results - page 341 / 396
» Compositional Model Checking of Real Time Systems
Sort
View
ENGL
2008
153views more  ENGL 2008»
13 years 9 months ago
Neural Network NARMA Control of a Gyroscopic Inverted Pendulum
The objective herein is to demonstrate the feasibility of a real-time digital control of an inverted pendulum for modeling and control, with emphasis on nonlinear auto regressive m...
F. Chetouane, S. Darenfed
DATAMINE
2006
117views more  DATAMINE 2006»
13 years 9 months ago
A Rule-Based Approach for Process Discovery: Dealing with Noise and Imbalance in Process Logs
Effective information systems require the existence of explicit process models. A completely specified process design needs to be developed in order to enact a given business proce...
Laura Maruster, A. J. M. M. Weijters, Wil M. P. va...
SIGMOD
2003
ACM
152views Database» more  SIGMOD 2003»
14 years 9 months ago
Using Sets of Feature Vectors for Similarity Search on Voxelized CAD Objects
In modern application domains such as multimedia, molecular biology and medical imaging, similarity search in database systems is becoming an increasingly important task. Especial...
Hans-Peter Kriegel, Stefan Brecheisen, Peer Kr&oum...
3DGIS
2006
Springer
14 years 3 months ago
3D Geometries in Spatial DBMS
Database management systems (DBMS) have significantly changed in the last several years. From a system dealing with management of administrative data they have involved to a spati...
Sisi Zlatanova
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
14 years 9 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki