Sciweavers

3121 search results - page 562 / 625
» Information Survivability Control Systems
Sort
View
EMS
2008
IEEE
15 years 5 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
108
Voted
BCSHCI
2007
15 years 5 months ago
HCI and creative problem-solving at Lancaster
The Creative Problem-Solving Research Group (CPSRG) at Lancaster University is a collaboration between psychologists and computer scientists conducting research into creativity, p...
Thomas C. Ormerod, Linden J. Ball, Alan J. Dix, Co...
138
Voted
DBSEC
2010
161views Database» more  DBSEC 2010»
15 years 5 months ago
Secure Location Verification - A Security Analysis of GPS Signal Authentication
The use of location based services has increased significantly over the last few years. However, location information is only sparsely used as a security mechanism. One of the reas...
Georg T. Becker, Sherman C. Lo, David S. De Lorenz...
133
Voted
BIOSTEC
2008
192views Healthcare» more  BIOSTEC 2008»
15 years 5 months ago
Application of Process Mining in Healthcare - A Case Study in a Dutch Hospital
Abstract. To gain competitive advantage, hospitals try to streamline their processes. In order to do so, it is essential to have an accurate view of the "careflows" under...
R. S. Mans, Helen Schonenberg, Minseok Song, Wil M...
120
Voted
NIPS
2001
15 years 5 months ago
Probabilistic principles in unsupervised learning of visual structure: human data and a model
To find out how the representations of structured visual objects depend on the co-occurrence statistics of their constituents, we exposed subjects to a set of composite images wit...
Shimon Edelman, Benjamin P. Hiles, Hwajin Yang, Na...