Search alternatives:
tree » three (Expand Search)
processor » processes (Expand Search)
Showing 1 - 20 results of 1,240 for search 'the (true OR tree) information (processor OR process)', query time: 0.17s Refine Results
  1. 1
  2. 2

    Information Processor by Jia-Rey Chang

    Published 2018-12-01
    “…The shifting roles of computer technology in architectural design are obviously defined by the manner of how designers interpret, digest and operate/process the streams of information flow. …”
    Get full text
    Article
  3. 3

    Analysis of the epidemiological situation of true pemphigus in Azerbaijan in the process of long-term dynamics by G. Z. Faradzheva

    Published 2022-11-01
    “…Currently, true acantholytic pemphigus refers to severe autoimmune diseases, which, in the absence of timely adequate therapy, can turn into autoaggression with a possible fatal outcome. …”
    Get full text
    Article
  4. 4

    Discovery of process variants based on trace context tree by Huan Fang, Wangcheng Liu, Wusong Wang, Shunxiang Zhang

    Published 2023-12-01
    “…Understanding differences among process variants helps analysts and managers to make informed decisions as to how to standardise or otherwise improve a business process. …”
    Get full text
    Article
  5. 5

    A Process Tree-Based Incomplete Event Log Repair Approach by Qiushi Wang, Liye Zhang, Rui Cao, Na Guo, Haijun Zhang, Cong Liu

    Published 2025-05-01
    “…Furthermore, by leveraging activity information within the traces, our approach achieves efficient and precise repair of loop nodes through a single traversal of the process tree. …”
    Get full text
    Article
  6. 6

    Automated Tree Detection Using Image Processing and Multisource Data by Grzegorz Dziczkowski, Barbara Probierz, Przemysław Juszczuk, Piotr Stefański, Tomasz Jach, Szymon Głowania, Jan Kozak

    Published 2025-01-01
    “…We developed a data pipeline for gathering and pre-processing information, including vegetation data and numerical land-cover models, which were used to derive a new method for tree detection. …”
    Get full text
    Article
  7. 7
  8. 8

    Importance of Information and Documentation Management in the Process of Export by Erhan Kurban

    Published 2014-06-01
    “…This paper reviews skills of information pruduction and managemet effects on the process of export via true cases.…”
    Get full text
    Article
  9. 9
  10. 10

    Enterprise information system automatic fault diagnosis and analysis method based on decision tree by Xin JIN, Longchuan YAN, Jun LIU, Shulin ZHANG

    Published 2017-03-01
    “…The algorithm exploits information from system operation monitoring indicators and alarm data, based on decision tree, to automatically diagnose and analyze faults of enterprise information systems. …”
    Get full text
    Article
  11. 11

    SYSTEM-INFORMATION APPROACH TO UNCERTAINTY OF PROCESS AND SYSTEM PARAMETERS by Sergey Lutskyy

    Published 2021-09-01
    “…The subject matter of research in the article is a system-information approach to the uncertainty of the parameters of processes and systems of the technosphere as one of the scientific directions of using information theory in metrology and other scientific areas. …”
    Get full text
    Article
  12. 12
  13. 13

    An improved malicious code intrusion detection method based on target tree for space information network by Chundong She, Yaqi Ma, Jingchao Wang, Luting Jia

    Published 2017-12-01
    “…In this article, an improved malicious code intrusion detection method is presented based on the target tree for space information network, so as to adapt to the characteristics of space information network and the security requirements. …”
    Get full text
    Article
  14. 14

    Generating Encrypted Document Index Structure Using Tree Browser by Doaa N. Mhawi, Haider W. Oleiwi, Heba L. Al-Taie

    Published 2023-06-01
    “…Therefore, it requires combining confidentiality with the indexed document, and a separate process is performed to encrypt the documents. Hence, a new indexing structure named tree browser (TB) was proposed in this paper to be applied to index files of the large document set in an encrypted manner. …”
    Get full text
    Article
  15. 15

    RFID Privacy Risk Evaluation Based on Synthetic Method of Extended Attack Tree and Information Feature Entropy by Peng Li, Chao Xu, Long Chen, Ruchuan Wang

    Published 2015-11-01
    “…In addition, we model the process of an RFID data privacy attack based on EAT, taking a sensitive information theft attack on an RFID tag as an example. …”
    Get full text
    Article
  16. 16

    Parallel construction of binary tree based on sorting by Ya. E. Romm, D. A. Chabanyuk

    Published 2018-12-01
    “…The work objective is to develop and study ways of accelerating the process of organizing and transforming the tree-like data structures on the basis of the stable maximum parallel sorting algorithms for their application to the basic operations of information retrieval on databases.Materials and Methods. …”
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Evaluation method of network attack effect based on attack tree and CVSS by Pan Gang, Mi Shichao, Guo Ronghua, Huang Ligang, Wang Jinsuo, Li Kai

    Published 2022-04-01
    “…In order to solve the over-dependence on index data in network attack effect evaluation and improve the accuracy of network attack effect evaluation, this paper proposed a network attack effect evaluation method based on attack tree and CVSS. Firstly, The attack tree model is used to describe the possible attack paths of the system, and the probability of each leaf node is solved by fuzzy analytic hierarchy process. …”
    Get full text
    Article
  20. 20