Sciweavers

134 search results - page 10 / 27
» Detecting Clones in Business Applications
Sort
View
BPM
2010
Springer
163views Business» more  BPM 2010»
13 years 11 months ago
Self-adjusting Recommendations for People-Driven Ad-Hoc Processes
Abstract. A company's ability to flexibly adapt to changing business requirements is one key factor to remain competitive. The required flexibility in peopledriven processes i...
Christoph Dorn, Thomas Burkhart, Dirk Werth, Schah...
ICC
2007
IEEE
122views Communications» more  ICC 2007»
14 years 4 months ago
Detecting HTTP Tunnels with Statistical Mechanisms
Abstract— Application Level Gateways and firewalls are commonly used to enforce security policies at network boundaries, especially in large-sized business networks. However, se...
Manuel Crotti, Maurizio Dusi, Francesco Gringoli, ...
WCRE
1995
IEEE
14 years 1 months ago
Pattern Matching for Design Concept Localization
A legacy system is an operational, large-scale software system that is maintained beyond its first generation of programmers. It typically represents a massive economic investmen...
Kostas Kontogiannis, Renato de Mori, Morris Bernst...
CORR
2010
Springer
151views Education» more  CORR 2010»
13 years 8 months ago
A Comprehensive Survey of Data Mining-based Fraud Detection Research
This survey paper categorises, compares, and summarises from almost all published technical and review articles in automated fraud detection within the last 10 years. It defines t...
Clifton Phua, Vincent C. S. Lee, Kate Smith-Miles,...
JIDM
2010
90views more  JIDM 2010»
13 years 4 months ago
A Context-Dependent Supervised Learning Approach to Sentiment Detection in Large Textual Databases
Sentiment detection automatically identifies emotions in textual data. The increasing amount of emotive documents available in corporate databases and on the World Wide Web calls f...
Albert Weichselbraun, Stefan Gindl, Arno Scharl