Sciweavers

2635 search results - page 353 / 527
» Refactoring Process Models in Large Process Repositories
Sort
View
EVOW
2006
Springer
15 years 6 months ago
BeeHiveGuard: A Step Towards Secure Nature Inspired Routing Algorithms
Abstract. Nature inspired routing protocols for fixed and mobile networks are becoming an active area of research. However, analyzing their security threats and countering them hav...
Horst Wedde, Constantin Timm, Muddassar Farooq
123
Voted
PKDD
2000
Springer
120views Data Mining» more  PKDD 2000»
15 years 6 months ago
Multi-Relational Data Mining, Using UML for ILP
Although there is a growing need for multi-relational data mining solutions in KDD, the use of obvious candidates from the field of Inductive Logic Programming (ILP) has been limit...
Arno J. Knobbe, Arno Siebes, Hendrik Blockeel, Dan...
ISCA
1997
IEEE
78views Hardware» more  ISCA 1997»
15 years 6 months ago
Trading Conflict and Capacity Aliasing in Conditional Branch Predictors
As modern microprocessors employ deeper pipelines and issue multiple instructions per cycle, they are becoming increasingly dependent on accurate branch prediction. Because hardwa...
Pierre Michaud, André Seznec, Richard Uhlig
SGP
2007
15 years 5 months ago
A streaming algorithm for surface reconstruction
We present a streaming algorithm for reconstructing closed surfaces from large non-uniform point sets based on a geometric convection technique. Assuming that the sample points ar...
Rémi Allègre, Raphaëlle Chaine,...
165
Voted
INCDM
2010
Springer
208views Data Mining» more  INCDM 2010»
15 years 4 months ago
Combining Unsupervised and Supervised Data Mining Techniques for Conducting Customer Portfolio Analysis
Abstract. Leveraging the power of increasing amounts of data to analyze customer base for attracting and retaining the most valuable customers is a major problem facing companies i...
Zhiyuan Yao, Annika H. Holmbom, Tomas Eklund, Barb...