Sciweavers

32 search results - page 6 / 7
» False-noise analysis using logic implications
Sort
View
ACSAC
2009
IEEE
15 years 10 months ago
An Empirical Approach to Modeling Uncertainty in Intrusion Analysis
: © An Empirical Approach to Modeling Uncertainty in Intrusion Analysis Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja Sakthivelmurugan HP Laboratories HPL-2009-334 intrusion de...
Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja S...
135
Voted
DOLAP
2004
ACM
15 years 8 months ago
Data warehouse design to support customer relationship management analyses
CRM is a strategy that integrates the concepts of Knowledge Management, Data Mining, and Data Warehousing in order to support the organization’s decision-making process to retai...
Colleen Cunningham, Il-Yeol Song, Peter P. Chen
CCGRID
2006
IEEE
15 years 9 months ago
Component-Based Modeling, Analysis and Animation
Component-based software construction is widely used in a variety of applications, from embedded environments to grid computing. However, errors in these applications and systems ...
Jeff Kramer
ICCS
2009
Springer
15 years 10 months ago
Access Policy Design Supported by FCA Methods
Role Based Access Control (RBAC) is a methodology for providing users in an IT system specific permissions like write or read to t abstracts from specific users and binds permiss...
Frithjof Dau, Martin Knechtel
IFSA
2003
Springer
89views Fuzzy Logic» more  IFSA 2003»
15 years 8 months ago
Lattice Fuzzy Signal Operators and Generalized Image Gradients
In this paper we use concepts from the lattice-based theory of morphological operators and fuzzy sets to develop generalized lattice image operators that are nonlinear convolutions...
Petros Maragos, Vassilis Tzouvaras, Giorgos B. Sta...