Sciweavers

1029 search results - page 119 / 206
» Dependence Anti Patterns
Sort
View
COOPIS
2004
IEEE
14 years 1 months ago
Discovering Workflow Transactional Behavior from Event-Based Log
Previous workflow mining works have concentrated their efforts on process behavioral aspects. Although powerful, these proposals are found lacking in functionalities and performanc...
Walid Gaaloul, Sami Bhiri, Claude Godart
BIBE
2009
IEEE
131views Bioinformatics» more  BIBE 2009»
14 years 1 months ago
Learning Scaling Coefficient in Possibilistic Latent Variable Algorithm from Complex Diagnosis Data
—The Possibilistic Latent Variable (PLV) clustering algorithm is a powerful tool for the analysis of complex datasets due to its robustness toward data distributions of different...
Zong-Xian Yin
BMEI
2008
IEEE
14 years 5 days ago
A New Type of Image-Based Key
Keys are character based tools for plant identification. They are based on the decomposition of the plant into very small, atomistic parts. These parts are described with the tech...
Bruce Kirchoff, David Remington, Lixin Fu, Fereido...
DSD
2005
IEEE
96views Hardware» more  DSD 2005»
14 years 4 days ago
Improvement of the Fault Coverage of the Pseudo-Random Phase in Column-Matching BIST
Several methods improving the fault coverage in mixed-mode BIST are presented in this paper. The test is divided into two phases: the pseudo-random and deterministic. Maximum of f...
Peter Filter, Hana Kubatova
CSCW
2008
ACM
13 years 12 months ago
Influences on tag choices in del.icio.us
Collaborative tagging systems have the potential to produce socially constructed information organization schemes. The effectiveness of tags for finding and re-finding information...
Emilee J. Rader, Rick Wash