-
1
Discovery of process variants based on trace context tree
Published 2023-12-01“…Understanding differences among process variants helps analysts and managers to make informed decisions as to how to standardise or otherwise improve a business process. …”
Get full text
Article -
2
A Process Tree-Based Incomplete Event Log Repair Approach
Published 2025-05-01“…Furthermore, by leveraging activity information within the traces, our approach achieves efficient and precise repair of loop nodes through a single traversal of the process tree. …”
Get full text
Article -
3
Automated Tree Detection Using Image Processing and Multisource Data
Published 2025-01-01“…We developed a data pipeline for gathering and pre-processing information, including vegetation data and numerical land-cover models, which were used to derive a new method for tree detection. …”
Get full text
Article -
4
Option Pricing by Willow Tree Method for Generalized Hyperbolic Lévy Processes
Published 2023-01-01Get full text
Article -
5
A Practical Solution to Handling Randomness and Imperfect Information in Monte Carlo Tree Search
Published 2021-09-01Get full text
Article -
6
Enterprise information system automatic fault diagnosis and analysis method based on decision tree
Published 2017-03-01“…The algorithm exploits information from system operation monitoring indicators and alarm data, based on decision tree, to automatically diagnose and analyze faults of enterprise information systems. …”
Get full text
Article -
7
Framework for the Georeferencing and Processing of BikePack LiDAR Data for Urban Tree Mapping
Published 2025-08-01Get full text
Article -
8
An improved malicious code intrusion detection method based on target tree for space information network
Published 2017-12-01“…In this article, an improved malicious code intrusion detection method is presented based on the target tree for space information network, so as to adapt to the characteristics of space information network and the security requirements. …”
Get full text
Article -
9
Generating Encrypted Document Index Structure Using Tree Browser
Published 2023-06-01“…Therefore, it requires combining confidentiality with the indexed document, and a separate process is performed to encrypt the documents. Hence, a new indexing structure named tree browser (TB) was proposed in this paper to be applied to index files of the large document set in an encrypted manner. …”
Get full text
Article -
10
RFID Privacy Risk Evaluation Based on Synthetic Method of Extended Attack Tree and Information Feature Entropy
Published 2015-11-01“…In addition, we model the process of an RFID data privacy attack based on EAT, taking a sensitive information theft attack on an RFID tag as an example. …”
Get full text
Article -
11
Parallel construction of binary tree based on sorting
Published 2018-12-01“…The work objective is to develop and study ways of accelerating the process of organizing and transforming the tree-like data structures on the basis of the stable maximum parallel sorting algorithms for their application to the basic operations of information retrieval on databases.Materials and Methods. …”
Get full text
Article -
12
Hierarchical Information-Extreme Machine Learning of Hand Prosthesis Control System Based on Decursive Data Structure
Published 2024-11-01Subjects: “…information-extreme intelligent technology…”
Get full text
Article -
13
Evaluation method of network attack effect based on attack tree and CVSS
Published 2022-04-01“…In order to solve the over-dependence on index data in network attack effect evaluation and improve the accuracy of network attack effect evaluation, this paper proposed a network attack effect evaluation method based on attack tree and CVSS. Firstly, The attack tree model is used to describe the possible attack paths of the system, and the probability of each leaf node is solved by fuzzy analytic hierarchy process. …”
Get full text
Article -
14
Equilibrium Strategies for Overtaking-Free Queueing Networks under Partial Information
Published 2024-09-01Get full text
Article -
15
Development Process and Characteristics Study of Tree Line Discharge in 10 kV Overhead Power Lines
Published 2025-07-01“…Based on the observed characteristics of the tree discharge process, feature extraction was performed using high-frequency signals that contained detailed information on high-frequency discharges. …”
Get full text
Article -
16
-
17
IPHILOGENETIC TREE OF ART / ФИЛОГЕНЕТИЧЕСКОЕ ДРЕВО ИСКУССТВ
Published 2019-12-01Get full text
Article -
18
-
19
Industrial OT network access authorization traceability method based on balanced Merkle tree
Published 2025-04-01Get full text
Article -
20
Research on territorial spatial planning based on data mining and geographic information visualization
Published 2025-04-01“…This article selects the clustering algorithm and decision tree in data mining technology, combines them organically, and puts forward spatial data mining. …”
Get full text
Article