Sciweavers

8614 search results - page 1550 / 1723
» Mining
Sort
View
BIRD
2008
Springer
131views Bioinformatics» more  BIRD 2008»
13 years 11 months ago
Identifying Subcellular Locations from Images of Unknown Resolution
Our group has previously used machine learning techniques to develop computational systems to automatically analyse fluorescence microscope images and classify the location of the ...
Luís Pedro Coelho, Robert F. Murphy
BPM
2008
Springer
157views Business» more  BPM 2008»
13 years 11 months ago
Workflow Simulation for Operational Decision Support Using Design, Historic and State Information
Simulation is widely used as a tool for analyzing business s but is mostly focused on examining rather abstract steady-state situations. Such analyses are helpful for the initial d...
Anne Rozinat, Moe Thandar Wynn, Wil M. P. van der ...
BPM
2008
Springer
109views Business» more  BPM 2008»
13 years 11 months ago
Automating Knowledge Transfer and Creation in Knowledge Intensive Business Processes
It is a well known fact that a wealth of knowledge relies in the employees which makes them one of the most or even the most valuable asset of organisations. But often this knowled...
Michael Granitzer, Gisela Granitzer, Klaus Tochter...
CCGRID
2008
IEEE
13 years 11 months ago
AMP: An Affinity-Based Metadata Prefetching Scheme in Large-Scale Distributed Storage Systems
Prefetching is an effective technique for improving file access performance, which can reduce access latency for I/O systems. In distributed storage system, prefetching for metadat...
Lin Lin, Xueming Li, Hong Jiang, Yifeng Zhu, Lei T...
CEAS
2008
Springer
13 years 11 months ago
A Campaign-based Characterization of Spamming Strategies
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...
« Prev « First page 1550 / 1723 Last » Next »