Sciweavers

2995 search results - page 86 / 599
» On multi-avoidance of generalized patterns
Sort
View
DEXAW
2009
IEEE
102views Database» more  DEXAW 2009»
13 years 11 months ago
A Pattern for Secure Graphical User Interface Systems
Several aspects of secure operating systems have been analyzed and described as security patterns. However, existing patterns do not cover explicitly the secure interaction of user...
Thomas Fischer, Ahmad-Reza Sadeghi, Marcel Winandy
FLAIRS
2010
13 years 10 months ago
Visual Object Detection using Frequent Pattern Mining
Object search in a visual scene is a highly challenging and computationally intensive task. Most of the current object detection techniques extract features from images for classi...
Yousuf Aboobaker Sait, Balaraman Ravindran
CIKM
2008
Springer
13 years 9 months ago
Mining term association patterns from search logs for effective query reformulation
Search engine logs are an emerging new type of data that offers interesting opportunities for data mining. Existing work on mining such data has mostly attempted to discover knowl...
Xuanhui Wang, ChengXiang Zhai
EURONGI
2008
Springer
13 years 9 months ago
Location Management Based on the Mobility Patterns of Mobile Users
In this paper, we propose a new mobility model as an extension of the random walk model. Our proposal gathers mobility patterns with several degrees of randomness, so that both ran...
Ignacio Martinez-Arrue, Pablo García-Escall...
DGO
2007
134views Education» more  DGO 2007»
13 years 9 months ago
Control patterns in a healthcare network
To keep a network of enterprises sustainable, inter-organizational control measures are needed to detect or prevent opportunistic behaviour of network participants. We present a m...
Vera Kartseva, Joris Hulstijn, Jaap Gordijn, Yao-H...