Sciweavers

7213 search results - page 1427 / 1443
» Automated model grouping
Sort
View
USS
2008
14 years 2 days ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger
DIM
2005
ACM
13 years 11 months ago
A delegation framework for federated identity management
Identity federation is a powerful scheme that links accounts of users maintained distinctly by different business partners. The concept of network identity is a driver for accele...
Hidehito Gomi, Makoto Hatakeyama, Shigeru Hosono, ...
DAGSTUHL
2007
13 years 11 months ago
Parallel universes to improve the diagnosis of cardiac arrhythmias
arrhythmias (extended abstract) Elisa Fromont, Ren´e Quiniou, Marie-Odile Cordier We are interested in using parallel universes to learn interpretable models that can be subseque...
Élisa Fromont, Rene Quiniou, Marie-Odile Co...
ICWSM
2008
13 years 11 months ago
Predicting Success and Failure in Weight Loss Blogs through Natural Language Use
We explore the emerging phenomenon of blogging about personal goals, and demonstrate how natural language processing tools can be used to uncover psychologically meaningful constr...
Cindy K. Chung, Clinton Jones, Alexander Liu, Jame...
MKWI
2008
246views Business» more  MKWI 2008»
13 years 11 months ago
Assessing the effects of IT changes on IT risk - A business process-oriented view
Abstract: The economic relevance of IT risk is increasing due to various operational, technical as well as regulatory reasons. Increasing flexibility of business processes and risi...
Stefan Sackmann
« Prev « First page 1427 / 1443 Last » Next »