Sciweavers

395 search results - page 79 / 79
» Workflow Time Patterns for Process-Aware Information Systems
Sort
View
FDG
2009
ACM
13 years 11 months ago
Exploring 3D gestural interfaces for music creation in video games
In recent years the popularity of music and rhythm-based games has experienced tremendous growth. However almost all of these games require custom hardware to be used as input dev...
Jared N. Bott, James G. Crowley, Joseph J. LaViola...
ESORICS
2004
Springer
13 years 10 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
VISUALIZATION
2000
IEEE
13 years 9 months ago
Extracting regions of interest applying a local watershed transformation
In this paper, we present a new technique for extracting regions of interest (ROI) applying a local watershed transformation. The proposed strategy for computing catchment basins ...
Stanislav L. Stoev, Wolfgang Straßer
IPPS
1998
IEEE
13 years 9 months ago
Configuration Independent Analysis for Characterizing Shared-Memory Applications
Characterizing shared-memory applications provides insight to design efficient systems, and provides awareness to identify and correct application performance bottlenecks. Configu...
Gheith A. Abandah, Edward S. Davidson
KDD
2000
ACM
101views Data Mining» more  KDD 2000»
13 years 8 months ago
Incremental quantile estimation for massive tracking
Data--call records, internet packet headers, or other transaction records--are coming down a pipe at a ferocious rate, and we need to monitor statistics of the data. There is no r...
Fei Chen, Diane Lambert, José C. Pinheiro