Sciweavers

8808 search results - page 182 / 1762
» Process Change Patterns
Sort
View
128
Voted
CCS
2010
ACM
15 years 2 months ago
Dialog-based payload aggregation for intrusion detection
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
Tobias Limmer, Falko Dressler
BIOINFORMATICS
2005
61views more  BIOINFORMATICS 2005»
15 years 2 months ago
Identification and measurement of neighbor-dependent nucleotide substitution processes
Abstract: The presence of different neighbor dependent substitution processes generates specific patterns of dinucleotide frequencies in all organisms. Based on a general framework...
Peter F. Arndt, Terence Hwa
83
Voted
WACV
2007
IEEE
15 years 8 months ago
Facial Strain Pattern as a Soft Forensic Evidence
The success of forensic identification largely depends on the availability of strong evidence or traces that substantiate the prosecution hypothesis that a certain person is guil...
Vasant Manohar, Dmitry B. Goldgof, Sudeep Sarkar, ...
MKWI
2008
134views Business» more  MKWI 2008»
15 years 4 months ago
Usage of Model Driven Engineering in the context of Business Process Management
: This paper shows how Model Driven Engineering (MDE) and Business Process Management (BPM) can be combined when generating executable BPEL processes out of BPMN models. By adding ...
Pascal Bauler, Fernand Feltz, Etienne Frogneux, Be...
97
Voted
ICASSP
2009
IEEE
15 years 9 months ago
Bandwidth adaptive hardware architecture of K-Means clustering for intelligent video processing
K-Means is a clustering algorithm that is widely applied in many elds, including pattern classi cation and multimedia analysis. Due to real-time requirements and computational-cos...
Tse-Wei Chen, Shao-Yi Chien