Sciweavers

8658 search results - page 1584 / 1732
» Models of Command and Control
Sort
View
SAC
2008
ACM
13 years 7 months ago
Anomaly detection algorithms in logs of process aware systems
Today, there is a variety of systems that support business process as a whole or partially. However, normative systems are not appropriate for some domains (e.g. health care) as a...
Fábio de Lima Bezerra, Jacques Wainer
IAJIT
2010
157views more  IAJIT 2010»
13 years 6 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Database
: Privacy is one of the most important properties of an information system must satisfy, in which systems the need to share information among different, not trusted entities, the p...
Ashraf El-Sisi
IJON
2008
152views more  IJON 2008»
13 years 6 months ago
Topos: Spiking neural networks for temporal pattern recognition in complex real sounds
This article depicts the approach used to build the Topos application, a simulation of two-wheel robots able to discern real complex sounds. Topos is framed in the nouvelle concep...
Pablo González-Nalda, Blanca Cases
ICCCI
2010
Springer
13 years 6 months ago
Strategic Health Information Management and Forecast: The Birdwatching Approach
Abstract. To facilitate communication and the exchange of information between patients, nurses, lab technicians, health insurers, physicians, policy makers, and existing knowledge-...
Arash Shaban-Nejad, Volker Haarslev
ICRA
2010
IEEE
88views Robotics» more  ICRA 2010»
13 years 6 months ago
Relaxed optimization for mode estimation in skid steering
— Skid-steered vehicles, by design, must skid in order to maneuver. The skidding causes the vehicle to behave discontinuously as well as introduces complications to the observati...
Timothy M. Caldwell, Todd D. Murphey
« Prev « First page 1584 / 1732 Last » Next »