Sciweavers

2137 search results - page 379 / 428
» Extraction of Structural Information from the Web
Sort
View
BPM
2007
Springer
130views Business» more  BPM 2007»
14 years 3 months ago
Process Mining Based on Clustering: A Quest for Precision
Process mining techniques attempt to extract non-trivial and useful information from event logs recorded by information systems. For example, there are many process mining techniqu...
Ana Karla Alves de Medeiros, Antonella Guzzo, Gian...
MMSEC
2006
ACM
167views Multimedia» more  MMSEC 2006»
14 years 2 months ago
Hermite polynomials as provably good functions to watermark white gaussian hosts
In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in content. The watermark detector checks for the pr...
Teddy Furon
ERSHOV
2003
Springer
14 years 2 months ago
On the Possibility of Provably Secure Obfuscating Programs
By obfuscation we mean any efficient semantic-preserving transformation of computer programs aimed at bringing a program into such a form, which impedes the understanding of its al...
Nikolay P. Varnovsky, Vladimir A. Zakharov
EURONGI
2008
Springer
13 years 10 months ago
Performance Evaluation of Overlay-Based Range Queries in Mobile Systems
Current mobility management systems are operator centralized, and focused on single link technologies. In heterogeneous wireless mesh networks, vertical handovers could be a length...
Amine M. Houyou, Alexander Stenzer, Hermann de Mee...
APBC
2003
128views Bioinformatics» more  APBC 2003»
13 years 10 months ago
Machine Learning in DNA Microarray Analysis for Cancer Classification
The development of microarray technology has supplied a large volume of data to many fields. In particular, it has been applied to prediction and diagnosis of cancer, so that it e...
Sung-Bae Cho, Hong-Hee Won