Sciweavers

813 search results - page 102 / 163
» Pipeline-centric provenance model
Sort
View
BPM
2008
Springer
192views Business» more  BPM 2008»
13 years 11 months ago
Trace Clustering in Process Mining
Process mining has proven to be a valuable tool for analyzing operational process executions based on event logs. Existing techniques perform well on structured processes, but stil...
Minseok Song, Christian W. Günther, Wil M. P....
ESEM
2007
ACM
13 years 10 months ago
Assessing, Comparing, and Combining Statechart- based testing and Structural testing: An Experiment
An important number of studies have addressed the importance of models in software engineering, mainly in the design of robust software systems. Although models have been proven t...
Samar Mouchawrab, Lionel C. Briand, Yvan Labiche
WSC
2004
13 years 10 months ago
An Adaptive Approach to Fast Simulation of Traffic Groomed Optical Networks
In this paper, we consider the fast simulation of traffic groomed optical networks, in which multiple sub-rate traffic streams may be carried on the same wavelength. For real-size...
Chih-Chieh Hsu, Michael Devetsikiotis
MM
2010
ACM
174views Multimedia» more  MM 2010»
13 years 9 months ago
Image classification using the web graph
Image classification is a well-studied and hard problem in computer vision. We extend a proven solution for classifying web spam to handle images. We exploit the link structure of...
Dhruv Kumar Mahajan, Malcolm Slaney
CCS
2010
ACM
13 years 9 months ago
A privacy recommendation wizard for users of social networking sites
Privacy is a huge problem for users of social networking sites. While sites like Facebook allow individual users to personalize fine-grained privacy settings, this has proven quit...
Lujun Fang, Heedo Kim, Kristen LeFevre, Aaron Tami