Sciweavers

5934 search results - page 1177 / 1187
» Detecting a Network Failure
Sort
View
BPM
2009
Springer
157views Business» more  BPM 2009»
15 years 14 days ago
ProM: The Process Mining Toolkit
Nowadays, all kinds of information systems store detailed information in logs. Examples of such systems include classical workflow management systems (Staffware), ERP systems (SAP)...
Wil M. P. van der Aalst, Boudewijn F. van Dongen, ...
DIM
2008
ACM
15 years 13 days ago
Anti-phishing based on automated individual white-list
In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
Ye Cao, Weili Han, Yueran Le
MM
2010
ACM
163views Multimedia» more  MM 2010»
14 years 11 months ago
Sonify your face: facial expressions for sound generation
We present a novel visual creativity tool that automatically recognizes facial expressions and tracks facial muscle movements in real time to produce sounds. The facial expression...
Roberto Valenti, Alejandro Jaimes, Nicu Sebe
ADHOC
2008
103views more  ADHOC 2008»
14 years 11 months ago
Impact of sensor-enhanced mobility prediction on the design of energy-efficient localization
Energy efficiency and positional accuracy are often contradictive goals. We propose to decrease power consumption without sacrificing significant accuracy by developing an energy-...
Chuang-Wen You, Polly Huang, Hao-Hua Chu, Yi-Chao ...
BMCBI
2010
135views more  BMCBI 2010»
14 years 11 months ago
Delineation of amplification, hybridization and location effects in microarray data yields better-quality normalization
Background: Oligonucleotide arrays have become one of the most widely used high-throughput tools in biology. Due to their sensitivity to experimental conditions, normalization is ...
Marc Hulsman, Anouk Mentink, Eugene P. van Someren...
« Prev « First page 1177 / 1187 Last » Next »