Sciweavers

528 search results - page 28 / 106
» Introducing records by refactoring
Sort
View
NDSS
2006
IEEE
15 years 3 months ago
Isolating Intrusions by Automatic Experiments
When dealing with malware infections, one of the first tasks is to find the processes that were involved in the attack. We introduce Malfor, a system that isolates those process...
Stephan Neuhaus, Andreas Zeller
BPM
2004
Springer
167views Business» more  BPM 2004»
15 years 3 months ago
Mining Social Networks: Uncovering Interaction Patterns in Business Processes
Increasingly information systems log historic information in a systematic way. Workflow management systems, but also ERP, CRM, SCM, and B2B systems often provide a so-called “ev...
Wil M. P. van der Aalst, Minseok Song
VLDB
1998
ACM
134views Database» more  VLDB 1998»
15 years 1 months ago
Design, Implementation, and Performance of the LHAM Log-Structured History Data Access Method
Numerous applications such as stock market or medical information systems require that both historical and current data be logically integrated into a temporal database. The under...
Peter Muth, Patrick E. O'Neil, Achim Pick, Gerhard...
CHI
2005
ACM
14 years 11 months ago
Experience buffers: a socially appropriate, selective archiving tool for evidence-based care
Diagnosis, treatment, and monitoring of interventions for children with autism can profit most when caregivers have substantial amounts of data they can easily record and review a...
Gillian R. Hayes, Khai N. Truong, Gregory D. Abowd...
BIOSTEC
2008
114views Healthcare» more  BIOSTEC 2008»
14 years 11 months ago
A Supervised Wavelet Transform Algorithm for R Spike Detection in Noisy ECGs
Abstract. The wavelet transform is a widely used pre-filtering step for subsequent R spike detection by thresholding of the coefficients. The time-frequency decomposition is indeed...
Gael de Lannoy, Arnaud de Decker, Michel Verleysen