Sciweavers

495 search results - page 40 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
IJON
2007
74views more  IJON 2007»
13 years 7 months ago
Visual object concept discovery: Observations in congenitally blind children, and a computational approach
Over the course of the first few months of life, our brains accomplish a remarkable feat. They are able to interpret complex visual images so that instead of being just disconnec...
Jake V. Bouvrie, Pawan Sinha
AMAI
2007
Springer
13 years 7 months ago
Relational concept discovery in structured datasets
Relational datasets, i.e., datasets in which individuals are described both by their own features and by their relations to other individuals, arise from various sources such as d...
Marianne Huchard, Mohamed Rouane Hacene, Cyril Rou...
ICMT
2010
Springer
13 years 6 months ago
Implementing Business Process Recovery Patterns through QVT Transformations
Traditionally, software maintenance takes only technical information into account to evolve legacy systems. However, business knowledge, which could help to improve the comprehensi...
Ricardo Pérez-Castillo, Ignacio Garcí...
CAISE
2006
Springer
13 years 11 months ago
Evaluating Similarity and Difference in Service Matchmaking
Recently, enterprise interoperability has been improved by the Web Service technology, making available an ever-growing number of services. Service discovery is considered a crucia...
Devis Bianchini, Valeria De Antonellis, Michele Me...
ICASSP
2011
IEEE
12 years 11 months ago
Smart grid monitoring for intrusion and fault detection with new locally optimum testing procedures
The vulnerability of smart grid systems is a growing concern. Signal detection theory is employed here to detect a change in the system. We employ a discrete-time linear state spa...
Qian He, Rick S. Blum