Sciweavers

7397 search results - page 1427 / 1480
» Processes Are Data: A Programming Model for Distributed Appl...
Sort
View
ISMIS
2009
Springer
15 years 9 months ago
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining
Workflow mining aims to find graph-based process models based on activities, emails, and various event logs recorded in computer systems. Current workflow mining techniques mainly ...
Liqiang Geng, Scott Buffett, Bruce Hamilton, Xin W...
ICPR
2008
IEEE
15 years 9 months ago
Approximation of salient contours in cluttered scenes
This paper proposes a new approach to describe the salient contours in cluttered scenes. No need to do the preprocessing, such as edge detection, we directly use a set of random s...
Rui Huang, Nong Sang, Qiling Tang
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
15 years 9 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
3DPVT
2006
IEEE
186views Visualization» more  3DPVT 2006»
15 years 9 months ago
Range Image Registration Based on Circular Features
Range sensing technology allows the photo-realistic modeling of large-scale scenes, such as urban structures. A major bottleneck in the process of 3D scene acquisition is the auto...
Cecilia Chao Chen, Ioannis Stamos
ISMAR
2005
IEEE
15 years 8 months ago
Augmented Foam: A Tangible Augmented Reality for Product Design
Computer Aided Design applications have become designers’ inevitable tools for expressing and simulating innovative ideas and concepts. However, replacing traditional materials ...
Woohun Lee, Jun Park
« Prev « First page 1427 / 1480 Last » Next »