Region growing has become a popular method for 3D segmentation. Starting from a seed, this approach allows one to extract a region by merging all its neighbors and comparing the e...
Diversiļ¬cation of software assets through changing requirements impose a constant challenge on the developers and maintainers of large software systems. Recent research has addr...
Michael Fischer, Johann Oberleitner, Jacek Ratzing...
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Abstract. Reference process models capture common practices in a given domain and variations thereof. Such models are intended to be configured in a specific setting, leading to in...
Marcello La Rosa, Florian Gottschalk, Marlon Dumas...
Many authorities have started to use web sites to provide services based on transactions. The guiding vision is often a process portal for citizens that provides access to the cou...