Sciweavers

1235 search results - page 166 / 247
» Formalizing information security knowledge
Sort
View
CAISE
2005
Springer
14 years 1 months ago
A Meta Model for Process Mining Data
Abstract. Modern process-aware information systems store detailed information about processes as they are being executed. This kind of information can be used for very different p...
Boudewijn F. van Dongen, Wil M. P. van der Aalst
STORAGESS
2005
ACM
14 years 1 months ago
Toward a threat model for storage systems
The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for greater storage protection. However, there is the l...
Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Y...
ICDT
2003
ACM
132views Database» more  ICDT 2003»
14 years 1 months ago
Probabilistic Interval XML
Interest in XML databases has been growing over the last few years. In this paper, we study the problem of incorporating probabilistic information into XML databases. We propose th...
Edward Hung, Lise Getoor, V. S. Subrahmanian
SAS
2001
Springer
117views Formal Methods» more  SAS 2001»
14 years 7 days ago
Finite-Tree Analysis for Constraint Logic-Based Languages
Abstract. Logic languages based on the theory of rational, possibly infinite, trees have much appeal in that rational trees allow for faster unification (due to the omission of t...
Roberto Bagnara, Roberta Gori, Patricia M. Hill, E...
SWAP
2008
13 years 9 months ago
Collaborative Enterprise Integrated Modelling
Abstract. Enterprise modelling focuses on the construction of a structured description, the so-called enterprise model, which represents (a subset of) the aspects relevant to the a...
Marco Rospocher, Chiara Ghidini, Luciano Serafini,...