Sciweavers

1024 search results - page 180 / 205
» High-Level Execution Time Analysis
Sort
View
GECCO
2008
Springer
115views Optimization» more  GECCO 2008»
14 years 21 hour ago
A genetic programming approach to business process mining
The aim of process mining is to identify and extract process patterns from data logs to reconstruct an overall process flowchart. As business processes become more and more comple...
Chris J. Turner, Ashutosh Tiwari, Jörn Mehnen
CMPB
2010
152views more  CMPB 2010»
13 years 11 months ago
Fast free-form deformation using graphics processing units
A large number of algorithms have been developed to perform non-rigid registration and it is a tool commonly used in medical image analysis. The FreeForm Deformation algorithm is ...
Marc Modat, Gerard R. Ridgway, Zeike A. Taylor, Ma...
JDWM
2006
104views more  JDWM 2006»
13 years 11 months ago
Navigation Rules for Exploring Large Multidimensional Data Cubes
Navigating through multidimensional data cubes is a nontrivial task. Although On-Line Analytical Processing (OLAP) provides the capability to view multidimensional data through ro...
Navin Kumar, Aryya Gangopadhyay, George Karabatis,...
JIPS
2006
129views more  JIPS 2006»
13 years 11 months ago
Automatic Reading System for On-off Type DNA Chip
: In this study we propose an automatic reading system for diagnostic DNA chips. We define a general specification for an automatic reading system and propose a possible implementa...
Munho Ryu, Jong Dae Kim, Jongwon Kim
JSAC
2006
128views more  JSAC 2006»
13 years 11 months ago
A framework for misuse detection in ad hoc networks- part II
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically stop functioning due to operational failu...
D. Subhadrabandhu, S. Sarkar, F. Anjum