Sciweavers

DKE
2010
124views more  DKE 2010»
13 years 8 months ago
Mining process models with prime invisible tasks
Lijie Wen, Jianmin Wang, Wil M. P. van der Aalst, ...
DKE
2010
167views more  DKE 2010»
13 years 8 months ago
Discovering private trajectories using background information
Trajectories are spatio-temporal traces of moving objects which contain valuable information to be harvested by spatio-temporal data mining techniques. Applications like city traf...
Emre Kaplan, Thomas Brochmann Pedersen, Erkay Sava...
DKE
2010
136views more  DKE 2010»
13 years 8 months ago
Application integration on the user interface level: An ontology-based approach
Integration of software applications can be achieved on different levels: the data level, the business logic level, and the user interface level. Integration on the user interface ...
Heiko Paulheim, Florian Probst
IEEECSA
2009
13 years 9 months ago
A Hierarchical Approach to Landmarks Detection in Taekwondo Poomsae Videos
Taekwondo Poomsae performance is a series of basic movements for offense and defense techniques. Despite the high popularity and long history of Taekwondo, there has been less effo...
Munther Abualkibash, James Gedney, Yongbom Kim, Je...
IEEECSA
2009
13 years 9 months ago
Multiratecast in Wireless Fault Tolerant Sensor and Actuator Networks
We study the multicast problem in wireless sensor networks, where the source can send data to a fixed number of destinations (actuators) at a different rate (multiratecast). A typi...
Xuehong Liu, Arnaud Casteigts, Nishith Goel, Amiya...
IEEECSA
2009
13 years 9 months ago
Improved Query Plans for Unnesting Nested SQL Queries
- The SQL language allows users to express queries that have nested subqueries in them. Optimization of nested queries has received considerable attention over the last few years. ...
Pranav Khaitan, Satish Kumar M, Korra Sathya Babu,...