Sciweavers

2477 search results - page 386 / 496
» Object list controlled process data system
Sort
View
MODELLIERUNG
2004
13 years 11 months ago
CASE Support and Model-Based Development
ion from the implementation they use. Some tools rather consequently use this abstract model; others at least partly keep the implementational view, modeling components, e.g., by o...
Bernhard Schätz, Jan Romberg, Oscar Slotosch,...
IJBRA
2010
134views more  IJBRA 2010»
13 years 8 months ago
Deterministic graph-theoretic algorithm for detecting modules in biological interaction networks
—Accumulating evidence suggests that biological systems exhibit modular organization. Accurate identification of modularity is vital for understanding this organization. A recen...
Roger L. Chang, Feng Luo, Stuart Johnson, Richard ...
MM
2010
ACM
402views Multimedia» more  MM 2010»
13 years 8 months ago
Discriminative codeword selection for image representation
Bag of features (BoF) representation has attracted an increasing amount of attention in large scale image processing systems. BoF representation treats images as loose collections...
Lijun Zhang 0005, Chun Chen, Jiajun Bu, Zhengguang...
SISAP
2010
IEEE
243views Data Mining» more  SISAP 2010»
13 years 8 months ago
Similarity matrix compression for efficient signature quadratic form distance computation
Determining similarities among multimedia objects is a fundamental task in many content-based retrieval, analysis, mining, and exploration applications. Among state-of-the-art sim...
Christian Beecks, Merih Seran Uysal, Thomas Seidl
IJDE
2006
95views more  IJDE 2006»
13 years 10 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum