Sciweavers

2703 search results - page 186 / 541
» Learning operational requirements from goal models
Sort
View
SIGCOMM
2009
ACM
14 years 2 months ago
Network virtualization: a view from the bottom
The interest in network virtualization has been growing steadily among the networking community in the last few years. Network virtualization opens up new possibilities for the ev...
Jorge Carapinha, Javier Jiménez
APN
2010
Springer
13 years 6 months ago
Learning Workflow Petri Nets
Workflow mining is the task of automatically producing a workflow model from a set of event logs recording sequences of workflow events; each sequence corresponds to a use case or ...
Javier Esparza, Martin Leucker, Maximilian Schlund
TIP
2010
155views more  TIP 2010»
13 years 6 months ago
Laplacian Regularized D-Optimal Design for Active Learning and Its Application to Image Retrieval
—In increasingly many cases of interest in computer vision and pattern recognition, one is often confronted with the situation where data size is very large. Usually, the labels ...
Xiaofei He
IAT
2007
IEEE
14 years 2 months ago
Network Intrusion Detection by Means of Community of Trusting Agents
We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
Martin Rehák, Michal Pechoucek, Karel Barto...
JCIT
2010
156views more  JCIT 2010»
13 years 3 months ago
Intelligent Monitoring Approach for Pipeline Defect Detection from MFL Inspection
Artificial Neural Networks(ANNS) have top level of capability to progress the estimation of cracks in metal tubes. The aim of this paper is to propose an algorithm to identify mod...
Saeedreza Ehteram, Seyed Zeinolabedin Moussavi, Mo...