نتایج جستجو برای: image logs

تعداد نتایج: 386447  

2005
Jin Lai Yushun Fan

[Abstracts] Workflow logs that record the execution of business processes offer very valuable data resource for real-time enterprise performance measurement. In this paper, we proposed a novel scheme that uses the technology of data warehouse and OLAP to explore workflow logs and create complex analysis reports for enterprise performance measurement. Three key points of this scheme were studied...

2011
Arnau Erola Jordi Castellà-Roca Guillermo Navarro-Arribas Vicenç Torra

Web search engines gather information from the queries performed by the user in the form of query logs. These logs are extremely useful for research, marketing, or profiling, but at the same time they are a great threat to the user’s privacy. We provide a novel approach to anonymize query logs so they ensure user k-anonymity, by extending a common method used in statistical disclosure control: ...

2014
Ines Levin Michael Alvarez

This paper presents a systematic approach to automating the analysis of event logs recorded by the electronic voting tabulators in the course of an election. An attribute context-free grammar is used to specify the language of the event logs, and to distinguish compliant event logs (those that adhere to the defined proper conduct of an election) and non-compliant logs (those that deviate from t...

2014
Laurent D. Michel Alexander A. Shvartsman Nikolaj Volgushev

This paper presents a systematic approach to automating the analysis of event logs recorded by the electronic voting tabulators in the course of an election. An attribute context-free grammar is used to specify the language of the event logs, and to distinguish compliant event logs (those that adhere to the defined proper conduct of an election) and non-compliant logs (those that deviate from t...

2013
Anna A. Kalenkova Irina A. Lomazova

Process mining is a relatively new field of computer science which deals with process discovery and analysis based on event logs. In this work we consider the problem of discovering workflow nets with cancellation regions from event logs. Cancellations occur in the majority of real-life event logs. In spite of huge amount of process mining techniques little has been done on cancellation regions...

Journal: :J. Economic Theory 2004
David Cass Anna Pavlova

In this paper we critically examine the main workhorse model in asset pricing theory, the Lucas (1978) tree model (LT-Model), extended to include heterogeneous agents and multiple goods, and contrast it to the benchmark model in ...nancial equilibrium theory, the real assets model (RA-Model). Households in the LT-Model trade goods together with claims to Lucas trees (exogenous stochastic divide...

2015
Umbreen Sabir Mian Jerry den Hartog Sandro Etalle Nicola Zannone

The protection of sensitive information is of utmost importance for organizations. The complexity and dynamism of modern businesses are forcing a re-think of traditional protection mechanisms. In particular, a priori policy enforcement mechanisms are often complemented with auditing mechanisms that rely on an a posteriori analysis of logs recording users’ activities to prove conformity to polic...

2009
KEVIN J. DODDS DANIEL W. GILMORE STEVEN J. SEYBOLD

The Douglas-Þr beetle, Dendroctonus pseudotsugae Hopkins, was detected in 2001 in northernMinnesota outside its natural range and the range of its native hosts, Douglas-Þr, Pseudotsuga menziesii (Mirbel) Franco, and western larch, Larix occidentalisNutt. Consecutive years of detection indicated that D. pseudotsugae may have been established in a new environment and provided a possible example o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید