Sciweavers

1557 search results - page 290 / 312
» Evolution of Business Processes and a Process Simulation Too...
Sort
View
ISMIS
2009
Springer
14 years 3 months ago
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining
Workflow mining aims to find graph-based process models based on activities, emails, and various event logs recorded in computer systems. Current workflow mining techniques mainly ...
Liqiang Geng, Scott Buffett, Bruce Hamilton, Xin W...
CDC
2008
IEEE
151views Control Systems» more  CDC 2008»
14 years 3 months ago
Analysis of hybrid systems resulting from relay-type hysteresis and saturation: A Lyapunov approach
— This paper studies a class of hybrid systems with linear (or linear plus saturated linear) continuous and discrete dynamics, which are determined by a flow map and jump map, a...
Dan Dai, Ricardo G. Sanfelice, Tingshu Hu, Andrew ...
CISS
2008
IEEE
14 years 3 months ago
Near optimal lossy source coding and compression-based denoising via Markov chain Monte Carlo
— We propose an implementable new universal lossy source coding algorithm. The new algorithm utilizes two wellknown tools from statistical physics and computer science: Gibbs sam...
Shirin Jalali, Tsachy Weissman
DATE
2008
IEEE
110views Hardware» more  DATE 2008»
14 years 3 months ago
Run-time System for an Extensible Embedded Processor with Dynamic Instruction Set
One of the upcoming challenges in embedded processing is to incorporate an increasing amount of adaptivity in order to respond to the multifarious constraints induced by today’s...
Lars Bauer, Muhammad Shafique, Stephanie Kreutz, J...
DSN
2008
IEEE
14 years 3 months ago
Automated duplicate detection for bug tracking systems
Bug tracking systems are important tools that guide the maintenance activities of software developers. The utility of these systems is hampered by an excessive number of duplicate...
Nicholas Jalbert, Westley Weimer