Sciweavers

972 search results - page 122 / 195
» Intersection types and computational effects
Sort
View
ISMIS
2009
Springer
14 years 3 months ago
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining
Workflow mining aims to find graph-based process models based on activities, emails, and various event logs recorded in computer systems. Current workflow mining techniques mainly ...
Liqiang Geng, Scott Buffett, Bruce Hamilton, Xin W...
CVPR
2008
IEEE
14 years 3 months ago
Rotation symmetry group detection via frequency analysis of frieze-expansions
We present a novel and effective algorithm for rotation symmetry group detection from real-world images. We propose a frieze-expansion method that transforms rotation symmetry gro...
Seungkyu Lee, Robert T. Collins, Yanxi Liu
IMSCCS
2007
IEEE
14 years 3 months ago
A Mobile Ad Hoc Network with Mobile Satellite Earth-stations
Ad hoc networks face the problem of improving networks’ capacity and scalability. The scalability problem can be properly solved through physical hierarchy networking. In this p...
Song Han, Guochang Gu, Jun Ni
IPPS
2007
IEEE
14 years 3 months ago
Almost Peer-to-Peer Clock Synchronization
In this paper, an almost peer-to-peer (AP2P) clock synchronization protocol is proposed. AP2P is almost peer-topeer in the sense that it provides the desirable features of a purel...
Ahmed Sobeih, Michel Hack, Zhen Liu, Li Zhang
DBPL
2007
Springer
136views Database» more  DBPL 2007»
14 years 3 months ago
Analysis of Imperative XML Programs
The widespread adoption of XML has led to programming languages that support XML as a first class construct. In this paper, we present a method for analyzing and optimizing impera...
Michael G. Burke, Igor Peshansky, Mukund Raghavach...