Sciweavers

495 search results - page 35 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
PKDD
2010
Springer
184views Data Mining» more  PKDD 2010»
13 years 6 months ago
Shift-Invariant Grouped Multi-task Learning for Gaussian Processes
Multi-task learning leverages shared information among data sets to improve the learning performance of individual tasks. The paper applies this framework for data where each task ...
Yuyang Wang, Roni Khardon, Pavlos Protopapas
CSCWD
2005
Springer
13 years 9 months ago
Process mining in CSCW systems
Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
Wil M. P. van der Aalst
AEI
2007
119views more  AEI 2007»
13 years 7 months ago
Exploring the CSCW spectrum using process mining
Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
Wil M. P. van der Aalst
CAISE
2009
Springer
14 years 2 months ago
P2S: A Methodology to Enable Inter-organizational Process Design through Web Services
Abstract. With the advent of Service Oriented Architecture organizations have experienced services as a platform-independent technology to develop and use simple internal applicati...
Devis Bianchini, Cinzia Cappiello, Valeria De Anto...
CSCWD
2008
Springer
13 years 9 months ago
Running smart process based on goals
When web services are used to coalesce around the distributed applications, one prominent solution to manage and coordinate web services is the use of process management. Many res...
Zongmin Shang, Haiyang Wang, Liqiang Wang, Hui Li,...