Sciweavers

1126 search results - page 203 / 226
» Modularity and the Rule of Adaptation
Sort
View
BIOSTEC
2008
114views Healthcare» more  BIOSTEC 2008»
13 years 10 months ago
A Supervised Wavelet Transform Algorithm for R Spike Detection in Noisy ECGs
Abstract. The wavelet transform is a widely used pre-filtering step for subsequent R spike detection by thresholding of the coefficients. The time-frequency decomposition is indeed...
Gael de Lannoy, Arnaud de Decker, Michel Verleysen
ISSA
2008
13 years 10 months ago
Collective Improvisation: Complementing Information Security Frameworks with Self-Policing
The approach to information security governance has predominantly followed a functionalist paradigm with emphasis placed on formalized rule structures and policy frameworks. The a...
Kennedy Njenga, Irwin Brown
LREC
2008
131views Education» more  LREC 2008»
13 years 10 months ago
Chinese Term Extraction Based on Delimiters
Existing techniques extract term candidates by looking for internal and contextual information associated with domain specific terms. The algorithms always face the dilemma that f...
Yuhang Yang, Qin Lu, Tiejun Zhao
IMECS
2007
13 years 10 months ago
On Extendable Software Architecture for Spam Email Filtering
—The research community and the IT industry have invested significant effort in fighting spam emails. There are many different approaches, ranging from white listing, black listi...
Wanli Ma, Dat Tran, Dharmendra Sharma
WICSA
2008
13 years 10 months ago
Towards a Formal Model for Reconfigurable Software Architectures by Bigraphs
With the spread of the Internet and software evolution in complex intensive systems, software architecture often need be reconfigured during runtime to adapt variable environments...
Zhiming Chang, XinJun Mao, Zhichang Qi