Sciweavers

6757 search results - page 1167 / 1352
» Knowledge Analysis on Process Models
Sort
View
121
Voted
3DOR
2010
14 years 10 months ago
SHREC'10 Track: Range Scan Retrieval
The 3D Shape Retrieval Contest 2010 (SHREC'10) on range scan retrieval aims at comparing algorithms that match a range scan to complete 3D models in a target database. The qu...
Helin Dutagaci, Afzal Godil, Chun Pan Cheung, Taka...
SSDBM
2011
IEEE
239views Database» more  SSDBM 2011»
14 years 6 months ago
Recipes for Baking Black Forest Databases - Building and Querying Black Hole Merger Trees from Cosmological Simulations
Large-scale N-body simulations play an important role in advancing our understanding of the formation and evolution of large structures in the universe. These computations require ...
Julio López, Colin Degraf, Tiziana DiMatteo...
ICML
2005
IEEE
16 years 3 months ago
Combining model-based and instance-based learning for first order regression
T ORDER REGRESSION (EXTENDED ABSTRACT) Kurt Driessensa Saso Dzeroskib a Department of Computer Science, University of Waikato, Hamilton, New Zealand (kurtd@waikato.ac.nz) b Departm...
Kurt Driessens, Saso Dzeroski
SAGT
2009
Springer
136views Game Theory» more  SAGT 2009»
15 years 9 months ago
Non-clairvoyant Scheduling Games
In a scheduling game, each player owns a job and chooses a machine to execute it. While the social cost is the maximal load over all machines (makespan), the cost (disutility) of ...
Christoph Dürr, Nguyen Kim Thang
ACSAC
2008
IEEE
15 years 9 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
« Prev « First page 1167 / 1352 Last » Next »