Sciweavers

6978 search results - page 74 / 1396
» Reframing Requirements Analysis
Sort
View
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
13 years 8 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
APSCC
2010
IEEE
13 years 5 months ago
ValySeC: A Variability Analysis Tool for Service Compositions Using VxBPEL
Nowadays applications are increasingly developed based on remote Web services and service composition has become a powerful novel development paradigm. Due to the fact that such a...
Chang-ai Sun, Tieheng Xue, Marco Aiello
IEEEVAST
2010
13 years 5 months ago
Improving the visual analysis of high-dimensional datasets using quality measures
Modern visualization methods are needed to cope with very highdimensional data. Efficient visual analytical techniques are required to extract the information content in these dat...
Georgia Albuquerque, Martin Eisemann, Dirk J. Lehm...
PRL
2010
209views more  PRL 2010»
13 years 5 months ago
Efficient update of the covariance matrix inverse in iterated linear discriminant analysis
For fast classification under real-time constraints, as required in many imagebased pattern recognition applications, linear discriminant functions are a good choice. Linear discr...
Jan Salmen, Marc Schlipsing, Christian Igel
ICASSP
2011
IEEE
13 years 1 months ago
A combined linear programming-maximum likelihood approach to radial velocity data analysis for extrasolar planet detection
In this paper we introduce a new technique for estimating the parameters of the Keplerian model commonly used in radial velocity data analysis for extrasolar planet detection. The...
Prabhu Babu, Petre Stoica