Sciweavers

10435 search results - page 138 / 2087
» Measuring system normality
Sort
View
99
Voted
ICAIL
2007
ACM
15 years 6 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...
BIRTHDAY
2006
Springer
15 years 6 months ago
Best-First Rippling
Rippling is a form of rewriting that guides search by only performing steps that reduce the syntactic differences between formulae. Termination is normally ensured by a measure th...
Moa Johansson, Alan Bundy, Lucas Dixon
99
Voted
CMSB
2008
Springer
15 years 4 months ago
Formal Analysis of Abnormal Excitation in Cardiac Tissue
We present the Piecewise Linear Approximation Model of Ion Channel contribution (PLAMIC) to cardiac excitation. We use the PLAMIC model to conduct formal analysis of cardiac arrhyt...
Pei Ye, Radu Grosu, Scott A. Smolka, Emilia Entche...
124
Voted
DSOM
2008
Springer
15 years 4 months ago
SYMIAN: A Simulation Tool for the Optimization of the IT Incident Management Process
Incident Management is the process through which IT support organizations manage to restore normal service operation after a service disruption. The complexity of IT support organi...
Claudio Bartolini, Cesare Stefanelli, Mauro Torton...
153
Voted
DICTA
2003
15 years 4 months ago
3D Face Recognition Using Longitudinal Section and Transection
In this paper, a new practical implementation of a person verification system using features of longitudinal section and transection and other facial, rotation compensated 3D face ...
Yeung-hak Lee