Sciweavers

324 search results - page 39 / 65
» Model Transformations in Practice Workshop
Sort
View
AUTOMATICA
2006
94views more  AUTOMATICA 2006»
13 years 8 months ago
Subspace identification for FDI in systems with non-uniformly sampled multirate data
This paper proposes a novel subspace approach towards direct identification of a residual model for fault detection and isolation (FDI) in a system with non-uniformly sampled mult...
Weihua Li, Zhengang Han, Sirish L. Shah
JHSN
2006
100views more  JHSN 2006»
13 years 8 months ago
Reconfiguring Role Based Access Control policies using risk semantics
We present a refined model for Role Based Access Control policies and define a risk measure for the model, which expresses elements of the operational, combinatorial and conflict ...
Benjamin Aziz, Simon N. Foley, John Herbert, Garre...
SLE
2009
Springer
14 years 2 months ago
Ontological Metamodeling with Explicit Instantiation
Model Driven Engineering (MDE) is a promising paradigm for development. It raises the level of abstraction in software development by treating models as primary artifacts. The prac...
Alfons Laarman, Ivan Kurtev
TMM
2010
194views Management» more  TMM 2010»
13 years 2 months ago
Modeling Flickr Communities Through Probabilistic Topic-Based Analysis
Abstract--With the increased presence of digital imaging devices, there also came an explosion in the amount of multimedia content available online. Users have transformed from pas...
Radu Andrei Negoescu, Daniel Gatica-Perez
TSMC
2011
228views more  TSMC 2011»
13 years 3 months ago
Privacy-Preserving Outlier Detection Through Random Nonlinear Data Distortion
— Consider a scenario in which the data owner has some private/sensitive data and wants a data miner to access it for studying important patterns without revealing the sensitive ...
Kanishka Bhaduri, Mark D. Stefanski, Ashok N. Sriv...