Sciweavers

536 search results - page 27 / 108
» Modeling Workflow Patterns from First Principles
Sort
View
SAINT
2003
IEEE
15 years 7 months ago
Exploiting Pattern Relationship for Intrusion Detection
The problem of identifying patterns from system call trails of UNIX processes to better model application behavior has been investigated intensively. Most existing approaches focu...
Ning Jiang, Kien A. Hua, Jung-Hwan Oh
106
Voted
COGSCI
2010
114views more  COGSCI 2010»
15 years 2 months ago
Direct Associations or Internal Transformations? Exploring the Mechanisms Underlying Sequential Learning Behavior
We evaluate two broad classes of cognitive mechanisms that might support the learning of sequential patterns. According to the first, learning is based on the gradual accumulation...
Todd M. Gureckis, Bradley C. Love
CCR
2005
129views more  CCR 2005»
15 years 1 months ago
The problem of synthetically generating IP traffic matrices: initial recommendations
There exist a wide variety of network design problems that require a traffic matrix as input in order to carry out performance evaluation. The research community has not had at it...
Antonio Nucci, Ashwin Sridharan, Nina Taft
116
Voted
GROUP
2003
ACM
15 years 7 months ago
Concepts for usable patterns of groupware applications
Patterns, which are based on in-depth practical experience, can be instructing for the design of groupware applications as sociotechnical systems. On the basis of a summary of the...
Thomas Herrmann, Marcel Hoffmann, Isa Jahnke, Andr...
ICAPR
2001
Springer
15 years 6 months ago
Character Extraction from Interfering Background - Analysis of Double-Sided Handwritten Archival Documents
The sipping of ink through the pages of certain double-sided handwritten documents after long periods of storage poses a serious problem to human readers or OCR systems. This pape...
Chew Lim Tan, Ruini Cao, Qian Wang, Peiyi Shen