Sciweavers

727 search results - page 56 / 146
» Making Distortions Comprehensible
Sort
View
JDS
2007
104views more  JDS 2007»
13 years 7 months ago
Operational Risk Management How an I-DSS May Help
Operational Risk management, the least covered component of Enterprise Wide Risk Management, needs intelligent tools to implement Comprehensive Emergency Management Programs. In t...
Pedro A. C. Sousa, João Paulo Pimentã...
TON
2008
102views more  TON 2008»
13 years 7 months ago
Internet traffic behavior profiling for network security monitoring
Abstract--Recent spates of cyber-attacks and frequent emergence of applications affecting Internet traffic dynamics have made it imperative to develop effective techniques that can...
Kuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya
ICPR
2010
IEEE
13 years 6 months ago
Automatic Detection and Segmentation of Focal Liver Lesions in Contrast Enhanced CT Images
Abstract—In this paper a novel system for automatic detection and segmentation of focal liver lesions in CT images is presented. It utilizes a probabilistic boosting tree to clas...
Arne Militzer, Tobias Hager, Florian Jäger, Chris...
DSS
2008
109views more  DSS 2008»
13 years 6 months ago
Organizational culture and leadership in ERP implementation
In response to the call for research to unlock the mystery of benefit realization in ERP adoption and theorize the important predictors' effect on ERP implementation, we cond...
Weiling Ke, Kwok Kee Wei
IJSNET
2010
143views more  IJSNET 2010»
13 years 6 months ago
Multi-radio medium access control protocol for wireless sensor networks
— In this paper, we propose a new dual radio medium access control (MAC) protocol for wireless sensor networks. Our MAC protocol design combines the advantages of low and high fr...
Junaid Ansari, Xi Zhang, Petri Mähönen