Sciweavers

373 search results - page 54 / 75
» Reclaiming Knowledge: A Case for Evidence-Based Information ...
Sort
View
BPM
2006
Springer
153views Business» more  BPM 2006»
13 years 11 months ago
Decision Mining in ProM
Process-aware Information Systems typically log events (e.g., in transaction logs or audit trails) related to the actual business process executions. Proper analysis of these execu...
Anne Rozinat, Wil M. P. van der Aalst
KI
2002
Springer
13 years 7 months ago
Employing Text Mining for Semantic Tagging in DIAsDEM
Both public and private organizations have been accumulating large volumes of electronically available text documents for the past years. However, to turn text archives into profi...
Karsten Winkler, Myra Spiliopoulou
MOC
2002
103views more  MOC 2002»
13 years 7 months ago
A computational approach to Hilbert modular group fixed points
Some useful information is known about the fundamental domain for certain Hilbert modular groups. The six nonequivalent points with nontrivial isotropy in the fundamental domains u...
Jesse Ira Deutsch
TCOM
2010
110views more  TCOM 2010»
13 years 5 months ago
Joint data QR-detection and Kalman estimation for OFDM time-varying Rayleigh channel complex gains
—This paper deals with the case of a high speed mobile receiver operating in an orthogonal-frequency-divisionmultiplexing (OFDM) communication system. Assuming the knowledge of d...
Hussein Hijazi, Laurent Ros
TNC
2004
120views Education» more  TNC 2004»
13 years 9 months ago
Realtime Intrusion-Forensics: A First Prototype Implementation (based on a stack-based NIDS)
The function of a Network Intrusion Detection System (NIDS) is to identify any misuse and abnormal behavior determined as an attack to a network segment or network host. The propo...
Udo Payer