Sciweavers

2236 search results - page 363 / 448
» Intrusion detection techniques and approaches
Sort
View
CAISE
2010
Springer
13 years 10 months ago
Beyond Process Mining: From the Past to Present and Future
Abstract. Traditionally, process mining has been used to extract models from event logs and to check or extend existing models. This has shown to be useful for improving processes ...
Wil M. P. van der Aalst, Maja Pesic, Minseok Song
ICFP
2010
ACM
13 years 9 months ago
ReCaml: execution state as the cornerstone of reconfigurations
Most current techniques fail to achieve the dynamic update of recursive functions. A focus on execution states appears to be essential in order to implement dynamic update in this...
Jérémy Buisson, Fabien Dagnat
CGF
2008
75views more  CGF 2008»
13 years 9 months ago
Extraction Of Feature Lines On Surface Meshes Based On Discrete Morse Theory
We present an approach for extracting extremal feature lines of scalar indicators on surface meshes, based on discrete Morse Theory. By computing initial Morse-Smale complexes of ...
Jan Sahner, Britta Weber, Steffen Prohaska, Hans L...
JIRS
2008
165views more  JIRS 2008»
13 years 9 months ago
Visual Navigation for Mobile Robots: A Survey
Abstract Mobile robot vision-based navigation has been the source of countless research contributions, from the domains of both vision and control. Vision is becoming more and more...
Francisco Bonin-Font, Alberto Ortiz, Gabriel Olive...
ISF
2007
139views more  ISF 2007»
13 years 9 months ago
Integrated model-driven dashboard development
Abstract Business performance modeling and model-driven business transformation are two research directions that are attracting much attention lately. In this study, we propose an ...
Themis Palpanas, Pawan Chowdhary, George A. Mihail...