Sciweavers

266 search results - page 13 / 54
» Exception handling patterns for processes
Sort
View
DGO
2007
134views Education» more  DGO 2007»
13 years 9 months ago
Control patterns in a healthcare network
To keep a network of enterprises sustainable, inter-organizational control measures are needed to detect or prevent opportunistic behaviour of network participants. We present a m...
Vera Kartseva, Joris Hulstijn, Jaap Gordijn, Yao-H...
CSFW
1995
IEEE
13 years 11 months ago
Modelling and verifying key-exchange protocols using CSP and FDR
We discuss the issues involved in modelling and verifying key-exchange protocols within the framework of CSP and its model-checking tool FDR. Expressing such protocols within a pr...
A. W. Roscoe
PAKDD
2009
ACM
171views Data Mining» more  PAKDD 2009»
14 years 1 days ago
Detecting Abnormal Events via Hierarchical Dirichlet Processes
Abstract. Detecting abnormal event from video sequences is an important problem in computer vision and pattern recognition and a large number of algorithms have been devised to tac...
Xian-Xing Zhang, Hua Liu, Yang Gao, Derek Hao Hu
ICST
2009
IEEE
14 years 2 months ago
Seasonal Variation in the Vulnerability Discovery Process
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...
HyunChul Joh, Yashwant K. Malaiya
SEBD
2003
98views Database» more  SEBD 2003»
13 years 8 months ago
PAtterns for Next-generation DAtabase systems: preliminary results of the PANDA project
Nowadays, the vast volume of collected digital data obliges us to employ processing methods like pattern recognition and data mining in order to reduce the complexity of data manag...
Ilaria Bartolini, Elisa Bertino, Barbara Catania, ...