نتایج جستجو برای: only

تعداد نتایج: 1357814  

2009
Ana Karla A. de Medeiros Wil M. P. van der Aalst

Process mining techniques target the automatic discovery of information about process models in organizations. The discovery is based on the execution data registered in event logs. Current techniques support a variety of practical analysis, but they are somewhat limited because the labels in the log are not linked to any concepts. Thus, in this chapter we show how the analysis provided by curr...

2001
David D. Hwang Alan N. Willson

This paper describes the architecture and IC implementation of a rectangular-to-polar coordinate converter for digital communication applications. The architecture core uses small lookup ROMs, fast multipliers, and a single angle-rotation stage. Area and latency are reduced in comparison with traditional methods. The processor, implemented in 0.25m five-metal CMOS, has 14-b in-phase and quadrat...

2001
Byung-Do Yang Lee-Sup Kim

A new low power charge recycling ROM (CR-ROM) architecture is proposed. The CR-ROM uses charge-recycling method [4] in bit lines of ROM to save the power consumption. About 90% of the total power used in the ROM is consumed in bit lines [1]. With the proposed method, power consumption in ROM bit lines can be reduced asymptotically to zero if the number of bit lines is infinite and the sense amp...

2012
Jan Claes Geert Poels

In the last decade the field of process mining gained attention from research and practice. There is, however, not much known about the use and the appreciation of the involved techniques and tools, many of which are integrated into the well-known ProM framework. Therefore a questionnaire was sent out to ask people’s opinions about process mining and the ProM framework. This paper reports on th...

Journal: :Discrete Applied Mathematics 2004
Maria Isabel Gonzalez Vasco David Pérez-García

We point out several security flaws in the cryptosystem based on tree replacement systems proposed by Samuel, Thomas, Abisha and Subramanian at INDOCRYPT 2002. Due to the success of (among others) very simple ciphertext-only attacks, we evidence that this system does not, in its present form, offer acceptable security guarantees for cryptographic applications. © 2006 Elsevier B.V. All rights re...

Journal: :Cryptologia 2007
António Machiavelo Rogério Reis

In this paper we describe a fully automated ciphertext-only cryptanalysis attack on the Bifid cipher, for which the original text language is known. We have implemented this attack using Python. We use an easily computable statistical function to find the period of the cipher, and then the key-table is generated in a fairly efficient way. The process is directed in such a way that strongly narr...

2015
Yanfei Liu Timothy Boles Christopher Coffee Justin Galvan Steven Groff William Westrick Zhuming Bi Carlos Pomalaza-Ráez

This paper presents the design of a low-cost reconfigurable modular robotic platform. Modular robots can come in different forms involving several small modules attached together to form a working and moving robot. This robotic platform aims to be used in future robotics courses as a teaching tool or a prototype for research in modular robotics. The designed prototype is reprogrammable. The ove...

2005
D. B. GARLINGTON

THE investigation of the obedience of faith in Romans, commenced some three years ago, has thus far yielded two basic conclusions. (1) The phrase u[pakoh> pi<stewj (Rom 1:5; 16:26) embodies a twin idea: the obedience consisting in faith and the obedience arising out of faith. (2) Faith's obedience, defined in the first instance as perseverance, is the link between present justification by faith...

2010
Hagit Attiya Eshcar Hillel

We present PermiSTM, a single-version STM that satisfies a practical notion of permissiveness, usually associated with keeping many versions: it never aborts read-only transactions, and it aborts other transactions only due to a conflicting transaction (which writes to a common item), thereby avoiding spurious aborts. It avoids unnecessary contention on the memory, being strictly disjoint-acces...

2011
R. P. Jagadeesh Chandra Bose H. M. W. Verbeek Wil M. P. van der Aalst

Process models can be seen as “maps” describing the operational processes of organizations. Traditional process discovery algorithms have problems dealing with fine-grained event logs and lessstructured processes. The discovered models (i.e., “maps”) are spaghettilike and are difficult to comprehend or even misleading. One of the reasons for this can be attributed to the fact that the discovere...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید