Sciweavers

1135 search results - page 136 / 227
» Using Process Mining to Analyze and Improve Process Flexibil...
Sort
View
DASC
2006
IEEE
15 years 4 months ago
Assessing Vulnerabilities in Apache and IIS HTTP Servers
We examine the feasibility of quantitatively characterizing the vulnerabilities in the two major HTTP servers. In particular, we investigate the applicability of quantitative empi...
Sung-Whan Woo, Omar H. Alhazmi, Yashwant K. Malaiy...
KDD
2002
ACM
191views Data Mining» more  KDD 2002»
15 years 10 months ago
Multimedia Knowledge Integration, Summarization And Evaluation
This paper presents new methods for automatically integrating, summarizing and evaluating multimedia knowledge. These are essential for multimedia applications to efficiently and ...
Ana B. Benitez, Shih-Fu Chang
ICIP
2005
IEEE
15 years 11 months ago
Augmented particle filtering for efficient visual tracking
Visual tracking is one of the key tasks in computer vision. The particle filter algorithm has been extensively used to tackle this problem due to its flexibility. However the conv...
Chunhua Shen, Michael J. Brooks, Anton van den Hen...
JMIV
2006
176views more  JMIV 2006»
14 years 9 months ago
Centroidal Voronoi Tessellation Algorithms for Image Compression, Segmentation, and Multichannel Restoration
Centroidal Voronoi tessellations (CVT's) are special Voronoi tessellations for which the generators of the tessellation are also the centers of mass (or means) of the Voronoi ...
Qiang Du, Max Gunzburger, Lili Ju, Xiaoqiang Wang
SIGSOFT
2003
ACM
15 years 10 months ago
Making sense of runtime architecture for mobile phone software
We present a metamodel for runtime architecture and demonstrate with experimental results how this metamodel can be used to recover, analyze and improve runtime architecture of mo...
Alexander Ran, Raimondas Lencevicius