Sciweavers

495 search results - page 64 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
FORTE
2007
13 years 11 months ago
Transactional Reduction of Component Compositions
Behavioural protocols are beneficial to Component-Based Software Engineering and Service-Oriented Computing as they foster automatic procedures for discovery, composition, composi...
Serge Haddad, Pascal Poizat
ICIP
2004
IEEE
14 years 11 months ago
Discovering meaningful multimedia patterns with audio-visual concepts and associated text
The work presents the first effort to automatically annotate the semantic meanings of temporal video patterns obtained through unsupervised discovery processes. This problem is in...
Lexing Xie, Lyndon S. Kennedy, Shih-Fu Chang, Ajay...
ECIR
2009
Springer
14 years 6 months ago
Topic and Trend Detection in Text Collections Using Latent Dirichlet Allocation
Algorithms that enable the process of automatically mining distinct topics in document collections have become increasingly important due to their applications in many fields and ...
Levent Bolelli, Seyda Ertekin, C. Lee Giles
PVM
2005
Springer
14 years 3 months ago
A Peer-to-Peer Framework for Robust Execution of Message Passing Parallel Programs on Grids
Abstract. This paper presents P2P-MPI, a middleware aimed at computational grids. From the programmer point of view, P2P-MPI provides a message-passing programming model which enab...
Stéphane Genaud, Choopan Rattanapoka
DEEC
2006
IEEE
14 years 1 months ago
A Bottom-Up Workflow Mining Approach for Workflow Applications Analysis
Abstract. Engineering workflow applications are becoming more and more complex, involving numerous interacting business objects within considerable processes. Analysing the interac...
Walid Gaaloul, Karim Baïna, Claude Godart