Sciweavers

10392 search results - page 2002 / 2079
» Introduction to Computer Science
Sort
View
116
Voted
MICRO
2009
IEEE
315views Hardware» more  MICRO 2009»
15 years 7 months ago
Control flow obfuscation with information flow tracking
Recent micro-architectural research has proposed various schemes to enhance processors with additional tags to track various properties of a program. Such a technique, which is us...
Haibo Chen, Liwei Yuan, Xi Wu, Binyu Zang, Bo Huan...
BPM
2009
Springer
340views Business» more  BPM 2009»
15 years 7 months ago
Abstractions in Process Mining: A Taxonomy of Patterns
ions in Process Mining: A Taxonomy of Patterns R.P. Jagadeesh Chandra Bose1,2 and Wil M.P. van der Aalst1 1 Department of Mathematics and Computer Science, University of Technology...
R. P. Jagadeesh Chandra Bose, Wil M. P. van der Aa...
86
Voted
ATAL
2009
Springer
15 years 7 months ago
Self-deceptive decision making: normative and descriptive insights
Computational modeling of human belief maintenance and decision-making processes has become increasingly important for a wide range of applications. We present a framework for mod...
Jonathan Y. Ito, David V. Pynadath, Stacy C. Marse...
104
Voted
BTW
2009
Springer
138views Database» more  BTW 2009»
15 years 7 months ago
GEM: A Generic Visualization and Editing Facility for Heterogeneous Metadata
: Many model management tasks, e.g., schema matching or merging, require the manual handling of metadata. Given the diversity of metadata, its many different representations and mo...
Jürgen Göres, Thomas Jörg, Boris St...
113
Voted
BTW
2009
Springer
145views Database» more  BTW 2009»
15 years 7 months ago
Retrieving Metadata for Your Local Scholarly Papers
: We present a novel approach to retrieve metadata to scholarly papers stored locally as PDF files. A fingerprint is produced from the PDF fulltext to query an online metadata repo...
David Aumüller
« Prev « First page 2002 / 2079 Last » Next »