Sciweavers

19936 search results - page 79 / 3988
» Inductive process modeling
Sort
View
108
Voted
FDTC
2009
Springer
104views Cryptology» more  FDTC 2009»
15 years 9 months ago
Low Voltage Fault Attacks on the RSA Cryptosystem
—Fault injection attacks are a powerful tool to exploit implementative weaknesses of robust cryptographic algorithms. The faults induced during the computation of the cryptograph...
Alessandro Barenghi, Guido Bertoni, Emanuele Parri...
80
Voted
ACL
2008
15 years 4 months ago
Analyzing the Errors of Unsupervised Learning
We identify four types of errors that unsupervised induction systems make and study each one in turn. Our contributions include (1) using a meta-model to analyze the incorrect bia...
Percy Liang, Dan Klein
103
Voted
HICSS
2007
IEEE
115views Biometrics» more  HICSS 2007»
15 years 9 months ago
Information losses within the collaborative integration of different process models - BPML as an XML-based interchange format fo
During the last decades market competition created various constellations of collaborative integration between enterprises: integration of parts of the value chain or integration ...
Johannsen Florian, Susanne Leist, Gregor Zellner
150
Voted
APCCM
2008
15 years 4 months ago
Modelling Inter-Process Dependencies with High-Level Business Process Modelling Languages
The work presented in this paper targets the software integration on the level of business process models. The goal is to create the behavioural description of an integrated syste...
Georg Grossmann, Michael Schrefl, Markus Stumptner