Sciweavers

6087 search results - page 1018 / 1218
» Knowledge discovery methods
Sort
View
141
Voted
WISA
2004
Springer
15 years 10 months ago
Encrypted Watermarks and Linux Laptop Security
The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoL...
Markku-Juhani Olavi Saarinen
ECBS
2010
IEEE
147views Hardware» more  ECBS 2010»
15 years 10 months ago
Supporting Customizable Architectural Design Decision Management
—When engineering complex software systems, the key Architectural Design Decisions (ADD) and the reasoning underlying those decisions need to be fully understood by all stakehold...
Lianping Chen, Muhammad Ali Babar
134
Voted
SAC
2010
ACM
15 years 10 months ago
An ontology-based semantic foundation for ARIS EPCs
This paper presents an ontological analysis of the EPC (Eventdriven Process Chain) business process modeling notation supported in the ARIS Toolset. This ontological analysis prov...
Paulo Sérgio Santos Jr., João Paulo ...
HLK
2003
IEEE
15 years 10 months ago
Interactive 3D Building Modeling Using a Hierarchical Representation
Modeling and visualization of city scenes is important for many applications including entertainment and urban mission planning. Models covering wide areas can be efficiently cons...
Sung Chun Lee, Ramakant Nevatia
IAT
2003
IEEE
15 years 10 months ago
Person Name Identification in Chinese Documents Using Finite State Automata
This research is about automatic identification and extraction of person names in Chinese text documents. Solutions to this problem have immediate and extensive applications in ma...
Bing Shen, Zhongfei (Mark) Zhang, Chunfa Yuan
« Prev « First page 1018 / 1218 Last » Next »