Sciweavers

495 search results - page 22 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
DAC
2009
ACM
14 years 8 months ago
Analysis and mitigation of process variation impacts on Power-Attack Tolerance
Embedded cryptosystems show increased vulnerabilities to implementation attacks such as power analysis. CMOS technology trends are causing increased process variations which impac...
Lang Lin, Wayne P. Burleson
ICSE
2004
IEEE-ACM
14 years 7 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde
BPM
2009
Springer
161views Business» more  BPM 2009»
14 years 2 months ago
Trace Clustering Based on Conserved Patterns: Towards Achieving Better Process Models
Process mining refers to the extraction of process models from event logs. Real-life processes tend to be less structured and more flexible. Traditional process mining algorithms ...
R. P. Jagadeesh Chandra Bose, Wil M. P. van der Aa...
ISDA
2009
IEEE
14 years 2 months ago
From Local Patterns to Global Models: Towards Domain Driven Educational Process Mining
Educational process mining (EPM) aims at (i) constructing complete and compact educational process models that are able to reproduce all observed behavior (process model discovery...
Nikola Trcka, Mykola Pechenizkiy
KDD
2010
ACM
435views Data Mining» more  KDD 2010»
13 years 11 months ago
Topic models with power-law using Pitman-Yor process
One of the important approaches for Knowledge discovery and Data mining is to estimate unobserved variables because latent variables can indicate hidden and specific properties o...
Issei Sato, Hiroshi Nakagawa