Sciweavers

2874 search results - page 512 / 575
» Intrusion Detection: Systems and Models
Sort
View
CAISE
2010
Springer
13 years 11 months ago
Beyond Process Mining: From the Past to Present and Future
Abstract. Traditionally, process mining has been used to extract models from event logs and to check or extend existing models. This has shown to be useful for improving processes ...
Wil M. P. van der Aalst, Maja Pesic, Minseok Song
GISCIENCE
2010
Springer
212views GIS» more  GISCIENCE 2010»
13 years 11 months ago
Qualitative Change to 3-Valued Regions
Regions which evolve over time are a significant aspect of many phenomena in geographic information science. Examples include areas in which a measured value (e.g. temperature, sal...
Matt Duckham, John G. Stell, Maria Vasardani, Mich...
ICASSP
2010
IEEE
13 years 10 months ago
Automatic state discovery for unstructured audio scene classification
In this paper we present a novel scheme for unstructured audio scene classification that possesses three highly desirable and powerful features: autonomy, scalability, and robust...
Julian Ramos, Sajid M. Siddiqi, Artur Dubrawski, G...
AEI
2010
136views more  AEI 2010»
13 years 10 months ago
Bridging the sense-reasoning gap: DyKnow - Stream-based middleware for knowledge processing
nizing multiple forms of information and knowledge processing on different levels of abstraction in a structured and principled manner. We propose knowledge processing middleware a...
Fredrik Heintz, Jonas Kvarnström, Patrick Doh...
TIP
2008
269views more  TIP 2008»
13 years 10 months ago
An Example-Based Face Hallucination Method for Single-Frame, Low-Resolution Facial Images
This paper proposes a face hallucination method for the reconstruction of high-resolution facial images from single-frame, low-resolution facial images. The proposed method has bee...
Jeong-Seon Park, Seong-Whan Lee