Sciweavers

495 search results - page 21 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
CAISE
2006
Springer
13 years 11 months ago
Using Process Mining to Analyze and Improve Process Flexibility
Abstract. Contemporary information systems struggle with the requirement to provide flexibility and process support while still enforcing some degree of control. Workflow managemen...
Wil M. P. van der Aalst, Christian W. Günther...
GEOINFORMATICA
2011
13 years 2 months ago
Functional description of geoprocessing services as conjunctive datalog queries
Discovery of suitable web services is a crucial task in Spatial Data Infrastructures (SDI). In this work, we develop a novel approach to the discovery of geoprocessing services (WP...
Daniel Fitzner, Jörg Hoffmann, Eva Klien
CORR
2007
Springer
86views Education» more  CORR 2007»
13 years 7 months ago
On the Discovery of Random Trees
Abstract. We consider in this paper the problem of discovering, via a traceroute algorithm, the topology of a network, whose graph is spanned by an infinite branching process. A s...
Fabrice Guillemin, Philippe Robert
ESEM
2010
ACM
13 years 6 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
ICDM
2009
IEEE
109views Data Mining» more  ICDM 2009»
14 years 2 months ago
Knowledge Discovery from Citation Networks
—Knowledge discovery from scientific articles has received increasing attentions recently since huge repositories are made available by the development of the Internet and digit...
Zhen Guo, Zhongfei Zhang, Shenghuo Zhu, Yun Chi, Y...