Sciweavers

4944 search results - page 191 / 989
» From XML to Relational Models
Sort
View
BPM
2008
Springer
143views Business» more  BPM 2008»
15 years 6 months ago
Mining Based on Learning from Process Change Logs
In today's dynamic business world economic success of an enterprise increasingly depends on its ability to react to internal and external changes in a quick and flexible way. ...
Chen Li, Manfred Reichert, Andreas Wombacher
ICASSP
2011
IEEE
14 years 8 months ago
Analysis of the security of linear blinding techniques from an information theoretical point of view
We propose a novel model to characterize the security of linear blinding techniques. The proposed model relates the security of blinding to the possibility of estimating the blind...
Tiziano Bianchi, Alessandro Piva, Mauro Barni
LRE
2007
87views more  LRE 2007»
15 years 4 months ago
Unleashing the killer corpus: experiences in creating the multi-everything AMI Meeting Corpus
The AMI Meeting Corpus contains 100 hours of meetings captured using many synchronized recording devices, and is designed to support work in speech and video processing, language ...
Jean Carletta
TKDE
2010
160views more  TKDE 2010»
15 years 2 months ago
Using Proximity Search to Estimate Authority Flow
—Authority flow and proximity search have been used extensively in measuring the association between entities in data graphs, ranging from the Web to relational and XML database...
Vagelis Hristidis, Yannis Papakonstantinou, Ramakr...
PVLDB
2010
128views more  PVLDB 2010»
14 years 11 months ago
Searching Workflows with Hierarchical Views
Workflows are prevalent in diverse applications, which can be scientific experiments, business processes, web services, or recipes. With the dramatically growing number of workflo...
Ziyang Liu, Qihong Shao, Yi Chen