Sciweavers

1005 search results - page 175 / 201
» Patterns for Refinement Automation
Sort
View
ETRICS
2006
13 years 10 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
DEXA
1997
Springer
179views Database» more  DEXA 1997»
13 years 10 months ago
Linking Object-Oriented Conceptual Modeling with Object-Oriented Implementation in Java
Nowadays, if we want to obtain a sound and correct final software product it is very important to be able to properly join modern OO programming environments, which are built for ...
Oscar Pastor, Emilio Insfrán, Vicente Pelec...
BPM
2008
Springer
134views Business» more  BPM 2008»
13 years 8 months ago
Digital Identity and Reputation in the Context of a Bounded Social Ecosystem
This paper highlights the problem of digital identity, or cross-set unique identifying tokens, inherent in the application of social software in business processes. As social softw...
Ben Jennings, Anthony Finkelstein
LREC
2008
131views Education» more  LREC 2008»
13 years 8 months ago
Semantic Frame Annotation on the French MEDIA corpus
This paper introduces a knowledge representation formalism used for annotation of the French MEDIA dialogue corpus in terms of high level semantic structures. The semantic annotat...
Marie-Jean Meurs, Frédéric Duvert, F...
NIPS
2008
13 years 8 months ago
Multi-label Multiple Kernel Learning
We present a multi-label multiple kernel learning (MKL) formulation in which the data are embedded into a low-dimensional space directed by the instancelabel correlations encoded ...
Shuiwang Ji, Liang Sun, Rong Jin, Jieping Ye