Sciweavers

495 search results - page 51 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
BPM
2009
Springer
175views Business» more  BPM 2009»
14 years 4 months ago
Understanding Spaghetti Models with Sequence Clustering for ProM
The goal of process mining is to discover process models from event logs. However, for processes that are not well structured and have a lot of diverse behavior, existing process m...
Gabriel M. Veiga, Diogo R. Ferreira
CAISE
2009
Springer
14 years 4 months ago
TomTom for Business Process Management (TomTom4BPM)
Navigation systems have proven to be quite useful for many drivers. People increasingly rely on the devices of TomTom and other vendors and find it useful to get directions to go ...
Wil M. P. van der Aalst
IADIS
2003
13 years 11 months ago
MARIAN: A Framework Using Mobile Agents for Routing in Ad-Hoc Networks
The purpose of MARIAN is to investigate the degree of suitability for mobile agent technology in routing, topology discovery, and automatic network reconfiguration in ad-hoc wirel...
Nikos Migas, William J. Buchanan, Kevin A. McArtne...
AUSFORENSICS
2003
13 years 11 months ago
Computer Forensics in the Global Enterprise
The increase in cyber-crime has created the need for security technologies that are always one step ahead of the criminal. Computer forensics and incident response solutions allow...
Melisa Bleasdale, Scott Mann, John Patzakis
ICML
2006
IEEE
14 years 10 months ago
An intrinsic reward mechanism for efficient exploration
How should a reinforcement learning agent act if its sole purpose is to efficiently learn an optimal policy for later use? In other words, how should it explore, to be able to exp...
Özgür Simsek, Andrew G. Barto