Sciweavers

3451 search results - page 101 / 691
» Collaborative attack modeling
Sort
View
HICSS
2005
IEEE
140views Biometrics» more  HICSS 2005»
14 years 3 months ago
A Role-Based Framework for Business Process Modeling
Business objects are object-oriented representations of the concepts of interest in an organization, such as activities, resources and actors. Business objects collaborate with on...
Artur Caetano, Marielba Zacarias, António R...
CSFW
2005
IEEE
14 years 3 months ago
Reconstruction of Attacks against Cryptographic Protocols
We study an automatic technique for the verification of cryptographic protocols based on a Horn clause model of the protocol. This technique yields proofs valid for an unbounded ...
Xavier Allamigeon, Bruno Blanchet
IJEIS
2010
113views more  IJEIS 2010»
13 years 7 months ago
A Good Role Model for Ontologies: Collaborations
Abstract. Ontologies are today used to annotate web data with machine processable semantics and for domain modeling. As the use of ontologies increases and the ontologies themselve...
Michael Pradel, Jakob Henriksson, Uwe Aßmann
UAI
2000
13 years 11 months ago
Collaborative Filtering by Personality Diagnosis: A Hybrid Memory and Model-Based Approach
The growth of Internet commerce has stimulated the use of collaborative filtering (CF) algorithms as recommender systems. Such systems leverage knowledge about the known preferenc...
David M. Pennock, Eric Horvitz, Steve Lawrence, C....
ICALT
2010
IEEE
13 years 8 months ago
A New Approach Based on Modelled Traces to Compute Collaborative and Individual Indicators Human Interaction
We propose in this paper a new method to compute indicators based on models transformations. We use the concept of modeled trace and trace-based system to design an indicator. We u...
Tarek Djouad, Alain Mille, Christophe Reffay, Moha...