Sciweavers

495 search results - page 17 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
BPM
2007
Springer
130views Business» more  BPM 2007»
14 years 1 months ago
Process Mining Based on Clustering: A Quest for Precision
Process mining techniques attempt to extract non-trivial and useful information from event logs recorded by information systems. For example, there are many process mining techniqu...
Ana Karla Alves de Medeiros, Antonella Guzzo, Gian...
CORIA
2010
13 years 2 months ago
Spatio-Temporal Modeling for Knowledge Discovery in Satellite Image Databases
Knowledge discovery from satellite images in spatio-temporal context remains one of the major challenges in the remote sensing field. It is, always, difficult for a user to manuall...
Wadii Boulila, Imed Riadh Farah, Karim Saheb Ettab...
SAC
2004
ACM
14 years 1 months ago
Missing requirements and relationship discovery through proxy viewpoints model
This paper addresses the problem of “missing requirements” in software requirements specification (SRS) expressed in natural language. Due to rapid changes in technology and b...
Seok Won Lee, David C. Rine
UAI
2008
13 years 9 months ago
Causal discovery of linear acyclic models with arbitrary distributions
An important task in data analysis is the discovery of causal relationships between observed variables. For continuous-valued data, linear acyclic causal models are commonly used ...
Patrik O. Hoyer, Aapo Hyvärinen, Richard Sche...
ISPW
2006
IEEE
14 years 1 months ago
Definition and Analysis of Election Processes
This paper shows that process definition and analysis technologies can be used to reason about the vulnerability of election processes with respect to incorrect or fraudulent behav...
Mohammad S. Raunak, Bin Chen, Amr Elssamadisy, Lor...