Sciweavers

8808 search results - page 20 / 1762
» Process Change Patterns
Sort
View
SIGMOD
2007
ACM
196views Database» more  SIGMOD 2007»
15 years 9 months ago
Adaptive location constraint processing
An important problem for many location-based applications is the continuous evaluation of proximity relations among moving objects. These relations express whether a given set of ...
Zhengdao Xu, Hans-Arno Jacobsen
AINA
2008
IEEE
15 years 4 months ago
Multi-Character Processor Array for Pattern Matching in Network Intrusion Detection System
—Network Intrusion Detection System (NIDS) is a system developed for identifying attacks by using a set of rules. NIDS is an efficient way to provide the security protection for ...
Yeim-Kuan Chang, Ming-Li Tsai, Yu-Ru Chung
ICMCS
2006
IEEE
135views Multimedia» more  ICMCS 2006»
15 years 3 months ago
A Geometrically Robust Watermarking Scheme Based on Self-Recognition Watermark Pattern
Presently, almost all of the watermarking algorithms resistant to geometric attacks are dependent on the synchronization. In this paper, a geometrically robust watermarking scheme...
Hefei Ling, Zhengding Lu, Fuhao Zou, Wugang Yuan
CAISE
2004
Springer
15 years 3 months ago
Analyzing the Scope of a Change in a Business Process Model
Organizations often change their business processes. These changes lead to adjustments in the business process support (BPS) system. The impact of a change in a business process ma...
Pnina Soffer
TCSV
2008
124views more  TCSV 2008»
14 years 9 months ago
A Block-Edge-Pattern-Based Content Descriptor in DCT Domain
In this correspondence, we describe a robust and effective content descriptor based on block edge patterns extracted directly in DCT domain, which is suitable for applications in J...
Jianmin Jiang, Kaijin Qiu, Guoqiang Xiao