Search alternatives:
tree » three (Expand Search)
processor » process (Expand Search)
processes » process (Expand Search)
Showing 1 - 20 results of 858 for search 'the tree information (processor OR processes)', query time: 0.16s Refine Results
  1. 1

    Discovery of process variants based on trace context tree by Huan Fang, Wangcheng Liu, Wusong Wang, Shunxiang Zhang

    Published 2023-12-01
    “…Understanding differences among process variants helps analysts and managers to make informed decisions as to how to standardise or otherwise improve a business process. …”
    Get full text
    Article
  2. 2

    Automated Tree Detection Using Image Processing and Multisource Data by Grzegorz Dziczkowski, Barbara Probierz, Przemysław Juszczuk, Piotr Stefański, Tomasz Jach, Szymon Głowania, Jan Kozak

    Published 2025-01-01
    “…We developed a data pipeline for gathering and pre-processing information, including vegetation data and numerical land-cover models, which were used to derive a new method for tree detection. …”
    Get full text
    Article
  3. 3

    A Process Tree-Based Incomplete Event Log Repair Approach by Qiushi Wang, Liye Zhang, Rui Cao, Na Guo, Haijun Zhang, Cong Liu

    Published 2025-05-01
    “…Furthermore, by leveraging activity information within the traces, our approach achieves efficient and precise repair of loop nodes through a single traversal of the process tree. …”
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Enterprise information system automatic fault diagnosis and analysis method based on decision tree by Xin JIN, Longchuan YAN, Jun LIU, Shulin ZHANG

    Published 2017-03-01
    “…The algorithm exploits information from system operation monitoring indicators and alarm data, based on decision tree, to automatically diagnose and analyze faults of enterprise information systems. …”
    Get full text
    Article
  7. 7
  8. 8

    An improved malicious code intrusion detection method based on target tree for space information network by Chundong She, Yaqi Ma, Jingchao Wang, Luting Jia

    Published 2017-12-01
    “…In this article, an improved malicious code intrusion detection method is presented based on the target tree for space information network, so as to adapt to the characteristics of space information network and the security requirements. …”
    Get full text
    Article
  9. 9

    Generating Encrypted Document Index Structure Using Tree Browser by Doaa N. Mhawi, Haider W. Oleiwi, Heba L. Al-Taie

    Published 2023-06-01
    “…Therefore, it requires combining confidentiality with the indexed document, and a separate process is performed to encrypt the documents. Hence, a new indexing structure named tree browser (TB) was proposed in this paper to be applied to index files of the large document set in an encrypted manner. …”
    Get full text
    Article
  10. 10

    Parallel construction of binary tree based on sorting by Ya. E. Romm, D. A. Chabanyuk

    Published 2018-12-01
    “…The work objective is to develop and study ways of accelerating the process of organizing and transforming the tree-like data structures on the basis of the stable maximum parallel sorting algorithms for their application to the basic operations of information retrieval on databases.Materials and Methods. …”
    Get full text
    Article
  11. 11

    RFID Privacy Risk Evaluation Based on Synthetic Method of Extended Attack Tree and Information Feature Entropy by Peng Li, Chao Xu, Long Chen, Ruchuan Wang

    Published 2015-11-01
    “…Finally, an evaluation is carried out to calculate the RFID privacy attack tree sequences and information feature entropy of the atomic node. …”
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Development Process and Characteristics Study of Tree Line Discharge in 10 kV Overhead Power Lines by XU Huikai, HUANG Xiaolong, YANG Chunlan, CHEN Tianxiang, YANG Nongchao, CHEN Long

    Published 2025-07-01
    “…Based on the observed characteristics of the tree discharge process, feature extraction was performed using high-frequency signals that contained detailed information on high-frequency discharges. …”
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    Tree inventory and ecosystem service assessment using web-based geographic information system (GIS) tools: Case study in Edirne by Eylül Malkoç

    Published 2024-12-01
    “…We compiled a tree inventory and a method for assessing regulatory ecosystem services using web-based geographic information system (GIS) tools, namely Google Earth, Google My Maps, and MyTree. …”
    Get full text
    Article
  18. 18
  19. 19

    Research on territorial spatial planning based on data mining and geographic information visualization by Wang Yingqiao

    Published 2025-04-01
    “…This article selects the clustering algorithm and decision tree in data mining technology, combines them organically, and puts forward spatial data mining. …”
    Get full text
    Article
  20. 20

    Evaluation method of network attack effect based on attack tree and CVSS by Pan Gang, Mi Shichao, Guo Ronghua, Huang Ligang, Wang Jinsuo, Li Kai

    Published 2022-04-01
    “…In order to solve the over-dependence on index data in network attack effect evaluation and improve the accuracy of network attack effect evaluation, this paper proposed a network attack effect evaluation method based on attack tree and CVSS. Firstly, The attack tree model is used to describe the possible attack paths of the system, and the probability of each leaf node is solved by fuzzy analytic hierarchy process. …”
    Get full text
    Article