Sciweavers

1992 search results - page 355 / 399
» Model Based Testing with Labelled Transition Systems
Sort
View
141
Voted
ACSAC
2004
IEEE
15 years 6 months ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
IANDC
2011
129views more  IANDC 2011»
14 years 9 months ago
Rigid tree automata and applications
We introduce the class of Rigid Tree Automata (RTA), an extension of standard bottom-up automata on ranked trees with distinguished states called rigid. Rigid states define a res...
Florent Jacquemard, Francis Klay, Camille Vacher
IFIP
2001
Springer
15 years 6 months ago
Security Documentation
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Lam-for Kwok, Peggy P. K. Fung, Dennis Longley
117
Voted
EON
2003
15 years 3 months ago
An Ontology-Driven Application to Improve the Prescription of Educational Resources to Parents of Premature Infants
CST’s Baby CareLink provides a ‘collaborative healthware’ environment for parents of premature infants that incorporates just-in-time learning as one means of knowledge explo...
Howard Goldberg, Alfredo Morales, David MacMillan,...
126
Voted
BMCBI
2007
135views more  BMCBI 2007»
15 years 2 months ago
Sequence similarity is more relevant than species specificity in probabilistic backtranslation
Background: Backtranslation is the process of decoding a sequence of amino acids into the corresponding codons. All synthetic gene design systems include a backtranslation module....
Alfredo Ferro, Rosalba Giugno, Giuseppe Pigola, Al...