Sciweavers

2635 search results - page 406 / 527
» Refactoring Process Models in Large Process Repositories
Sort
View
IEEEARES
2006
IEEE
15 years 5 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
SMA
2006
ACM
136views Solid Modeling» more  SMA 2006»
15 years 5 months ago
Controlled-topology filtering
Many applications require the extraction of isolines and isosurfaces from scalar functions defined on regular grids. These scalar functions may have many different origins: from ...
Yotam I. Gingold, Denis Zorin
CAIP
2005
Springer
220views Image Analysis» more  CAIP 2005»
15 years 4 months ago
Application of Automatic Image Registration in a Segmentation Framework of Pelvic CT Images
In radiation treatment (RT) planning, clinicians must trace the outline of a few critical structures on a large number of images. Using automated image segmentation could save trem...
Attila Tanács, Eörs Máté...
ICMI
2005
Springer
120views Biometrics» more  ICMI 2005»
15 years 4 months ago
Perceiving ordinal data haptically under workload
Visual information overload is a threat to the interpretation of displays presenting large data sets or complex application environments. To combat this problem, researchers have ...
Anthony Tang, Peter McLachlan, Karen Lowe, Chalapa...
NLDB
2005
Springer
15 years 4 months ago
Combining Data-Driven Systems for Improving Named Entity Recognition
Abstract. The increasing flow of digital information requires the extraction, filtering and classification of pertinent information from large volumes of texts. An important pre...
Zornitsa Kozareva, Óscar Ferrández, ...