Sciweavers

781 search results - page 133 / 157
» Analysis and improvement of business process models using sp...
Sort
View
EDOC
2008
IEEE
14 years 2 months ago
EA4UP: An Enterprise Architecture-Assisted Telecom Service Development Method
The cost of a telecom service development is correlated to the discontinuity and the complexity of the process. To solve this problem, we propose a method dedicated to telecom ser...
Jacques Simonin, Francis Alizon, Jean-Pierre Desch...
IEEESP
2007
98views more  IEEESP 2007»
13 years 7 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
CIA
2008
Springer
13 years 9 months ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...
PAMI
2010
171views more  PAMI 2010»
13 years 6 months ago
Automatic Construction of Correspondences for Tubular Surfaces
Abstract— Statistical shape modeling is an established technique and is used for a variety of tasks in medical image processing, such as image segmentation and analysis. A challe...
Toon Huysmans, Jan Sijbers, Brigitte Verdonk
ICC
2009
IEEE
190views Communications» more  ICC 2009»
14 years 2 months ago
Decomposition for Low-Complexity Near-Optimal Routing in Multi-Hop Wireless Networks
Abstract—Network flow models serve as a popular mathematical framework for the analysis and optimization of Multi-hop Wireless Networks. They also serve to provide the understan...
Vinay Kolar, Nael B. Abu-Ghazaleh, Petri Mäh&...