Sciweavers

3785 search results - page 695 / 757
» Immune System Based Intrusion Detection System
Sort
View
CAISE
2010
Springer
15 years 29 days ago
Beyond Process Mining: From the Past to Present and Future
Abstract. Traditionally, process mining has been used to extract models from event logs and to check or extend existing models. This has shown to be useful for improving processes ...
Wil M. P. van der Aalst, Maja Pesic, Minseok Song
ECAI
2010
Springer
15 years 29 days ago
Event Model Learning from Complex Videos using ILP
Abstract. Learning event models from videos has applications ranging from abnormal event detection to content based video retrieval. Relational learning techniques such as Inductiv...
Krishna S. R. Dubba, Anthony G. Cohn, David C. Hog...
INFORMATICALT
2008
196views more  INFORMATICALT 2008»
14 years 12 months ago
An Efficient and Sensitive Decision Tree Approach to Mining Concept-Drifting Data Streams
Abstract. Data stream mining has become a novel research topic of growing interest in knowledge discovery. Most proposed algorithms for data stream mining assume that each data blo...
Cheng-Jung Tsai, Chien-I Lee, Wei-Pang Yang
IJCV
2006
262views more  IJCV 2006»
14 years 12 months ago
A Variational Model for Object Segmentation Using Boundary Information and Shape Prior Driven by the Mumford-Shah Functional
In this paper, we propose a new variational model to segment an object belonging to a given shape space using the active contour method, a geometric shape prior and the Mumford-Sha...
Xavier Bresson, Pierre Vandergheynst, Jean-Philipp...
VLSISP
2008
132views more  VLSISP 2008»
14 years 11 months ago
Scenario Selection and Prediction for DVS-Aware Scheduling of Multimedia Applications
Modern multimedia applications usually have real-time constraints and they are implemented using application-domain specific embedded processors. Dimensioning a system requires acc...
Stefan Valentin Gheorghita, Twan Basten, Henk Corp...