Sciweavers

32 search results - page 6 / 7
» False-noise analysis using logic implications
Sort
View
ACSAC
2009
IEEE
14 years 4 months ago
An Empirical Approach to Modeling Uncertainty in Intrusion Analysis
: © An Empirical Approach to Modeling Uncertainty in Intrusion Analysis Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja Sakthivelmurugan HP Laboratories HPL-2009-334 intrusion de...
Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja S...
DOLAP
2004
ACM
14 years 3 months ago
Data warehouse design to support customer relationship management analyses
CRM is a strategy that integrates the concepts of Knowledge Management, Data Mining, and Data Warehousing in order to support the organization’s decision-making process to retai...
Colleen Cunningham, Il-Yeol Song, Peter P. Chen
CCGRID
2006
IEEE
14 years 3 months ago
Component-Based Modeling, Analysis and Animation
Component-based software construction is widely used in a variety of applications, from embedded environments to grid computing. However, errors in these applications and systems ...
Jeff Kramer
ICCS
2009
Springer
14 years 4 months ago
Access Policy Design Supported by FCA Methods
Role Based Access Control (RBAC) is a methodology for providing users in an IT system specific permissions like write or read to t abstracts from specific users and binds permiss...
Frithjof Dau, Martin Knechtel
IFSA
2003
Springer
89views Fuzzy Logic» more  IFSA 2003»
14 years 3 months ago
Lattice Fuzzy Signal Operators and Generalized Image Gradients
In this paper we use concepts from the lattice-based theory of morphological operators and fuzzy sets to develop generalized lattice image operators that are nonlinear convolutions...
Petros Maragos, Vassilis Tzouvaras, Giorgos B. Sta...