Sciweavers

341 search results - page 27 / 69
» A Security Engineering Process based on Patterns
Sort
View
AES
2007
Springer
92views Cryptology» more  AES 2007»
15 years 2 months ago
MicroARTMAP for pattern recognition problems
Pattern recognition is an important aspect of a dominant technology such as machine intelligence. Domain specific fuzzy-neuro models particularly for the ‘black box’ implemen...
Sundaramoorthy Rajasekaran, Vasantha Kalyani David
106
Voted
DGO
2007
134views Education» more  DGO 2007»
15 years 3 months ago
Control patterns in a healthcare network
To keep a network of enterprises sustainable, inter-organizational control measures are needed to detect or prevent opportunistic behaviour of network participants. We present a m...
Vera Kartseva, Joris Hulstijn, Jaap Gordijn, Yao-H...
WWW
2003
ACM
15 years 7 months ago
User Access Pattern Enhanced Small Web Search
Current search engines generally employ link analysis techniques to web-page re-ranking. However, the same techniques are problematic in small webs, such as websites or intranet w...
Gui-Rong Xue, Hua-Jun Zeng, Zheng Chen, Wei-Ying M...
NIPS
2007
15 years 3 months ago
Invariant Common Spatial Patterns: Alleviating Nonstationarities in Brain-Computer Interfacing
Brain-Computer Interfaces can suffer from a large variance of the subject conditions within and across sessions. For example vigilance fluctuations in the individual, variable ta...
Benjamin Blankertz, Motoaki Kawanabe, Ryota Tomiok...
ASE
2008
120views more  ASE 2008»
15 years 2 months ago
Requirements model generation to support requirements elicitation: the Secure Tropos experience
In the last years several efforts have been devoted by researchers in the Requirements Engineering community to the development of methodologies for supporting designers during req...
Nadzeya Kiyavitskaya, Nicola Zannone