Sciweavers

1610 search results - page 169 / 322
» Testing Patterns
Sort
View
111
Voted
RAID
2010
Springer
15 years 1 months ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
125
Voted
SCIENTOMETRICS
2010
131views more  SCIENTOMETRICS 2010»
14 years 9 months ago
Academic team formation as evolving hypergraphs
This paper quantitatively explores the social and socio-semantic patterns of constitution of academic collaboration teams. To this end, we broadly underline two critical features ...
Carla Taramasco, Jean-Philippe Cointet, Camille Ro...
MICAI
2007
Springer
15 years 9 months ago
An EM Algorithm to Learn Sequences in the Wavelet Domain
The wavelet transform has been used for feature extraction in many applications of pattern recognition. However, in general the learning algorithms are not designed taking into acc...
Diego H. Milone, Leandro E. Di Persia
111
Voted
FLAIRS
2006
15 years 4 months ago
Melody Track Identification in Music Symbolic Files
Standard MIDI files contain data that can be considered as a symbolic representation of music (a digital score), and most of them are structured as a number of tracks, one of them...
David Rizo, Pedro J. Ponce de León, Antonio...
124
Voted
IS
2007
15 years 2 months ago
A configurable reference modelling language
Enterprise Systems (ES) are comprehensive off-the-shelf packages that have to be configured to suit the requirements of an organization. Most ES solutions provide reference models...
Michael Rosemann, Wil M. P. van der Aalst