Sciweavers

134 search results - page 14 / 27
» Detecting Clones in Business Applications
Sort
View
AVSS
2007
IEEE
14 years 4 months ago
Midground object detection in real world video scenes
Traditional video scene analysis depends on accurate background modeling to identify salient foreground objects. However, in many important surveillance applications, saliency is ...
Brian Valentine, Senyo Apewokin, Linda M. Wills, D...
SAC
2008
ACM
13 years 9 months ago
Anomaly detection algorithms in logs of process aware systems
Today, there is a variety of systems that support business process as a whole or partially. However, normative systems are not appropriate for some domains (e.g. health care) as a...
Fábio de Lima Bezerra, Jacques Wainer
ICIP
2002
IEEE
14 years 2 months ago
Detection and segmentation of sweeps in color graphics images
Business graphics are an important class of digital imagery. Such images are computer-generated, and comprise synthetic elements such as solid fills, line art, and color sweeps. O...
Salil Prabhakar, Hui Cheng, Raja Bala, John C. Han...
CAISE
2009
Springer
14 years 1 months ago
Anomaly Detection Using Process Mining
Abstract. Recently, several large companies have been involved in financial scandals related to mismanagement, resulting in financial damages for their stockholders. In response, c...
Fábio de Lima Bezerra, Jacques Wainer, Wil ...
JSW
2007
185views more  JSW 2007»
13 years 9 months ago
A Decision Support System base line Flexible Architecture to Intrusion Detection
—Becoming more competitive and more effective in the current scenes of Business and Public Administration, the organizations must be able to approach easily and quickly to the in...
Marcello Castellano, Giuseppe Mastronardi, Angela ...