Sciweavers

5580 search results - page 897 / 1116
» Meta-level Information Extraction
Sort
View
ADC
2009
Springer
175views Database» more  ADC 2009»
15 years 11 months ago
Conditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited p...
Md. Enamul Kabir, Hua Wang
AIME
2009
Springer
15 years 11 months ago
Segmentation of Text and Non-text in On-Line Handwritten Patient Record Based on Spatio-Temporal Analysis
Note taking is a common way for physicians to collect information from their patients in medical inquiries and diagnoses. Many times, when describing the pathology in medical recor...
Rattapoom Waranusast, Peter Haddawy, Matthew N. Da...
BPM
2009
Springer
258views Business» more  BPM 2009»
15 years 11 months ago
Activity Mining by Global Trace Segmentation
Process Mining is a technology for extracting non-trivial and useful information from execution logs. For example, there are many process mining techniques to automatically discove...
Christian W. Günther, Anne Rozinat, Wil M. P....
CAIP
2009
Springer
143views Image Analysis» more  CAIP 2009»
15 years 11 months ago
Finding Intrinsic and Extrinsic Viewing Parameters from a Single Realist Painting
In this paper we studied the geometry of a three-dimensional tableau from a single realist painting – Scott Fraser’s Three way vanitas (2006). The tableau contains a carefully ...
Tadeusz Jordan, David G. Stork, Wai L. Khoo, Zhiga...
DILS
2009
Springer
15 years 11 months ago
Integration of Full-Coverage Probabilistic Functional Networks with Relevance to Specific Biological Processes
Probabilistic functional integrated networks are powerful tools with which to draw inferences from high-throughput data. However, network analyses are generally not tailored to spe...
Katherine James, Anil Wipat, Jennifer Hallinan