Sciweavers

76 search results - page 6 / 16
» Suitability of a Classical Analysis Method for E-commerce Pr...
Sort
View
ICSE
2008
IEEE-ACM
14 years 7 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
ICASSP
2010
IEEE
13 years 7 months ago
A general formalism for the analysis of distributed algorithms
The major contribution of this paper is the presentation of a general unifying description of distributed algorithms allowing to map local, node-based, algorithms onto a single gl...
Ondrej Sluciak, Thibault Hilaire, Markus Rupp
BMCBI
2010
155views more  BMCBI 2010»
13 years 4 months ago
BrEPS: a flexible and automatic protocol to compute enzyme-specific sequence profiles for functional annotation
Background: Models for the simulation of metabolic networks require the accurate prediction of enzyme function. Based on a genomic sequence, enzymatic functions of gene products a...
Constantin Bannert, A. Welfle, C. aus dem Spring, ...
ICDM
2005
IEEE
130views Data Mining» more  ICDM 2005»
14 years 1 months ago
Obtaining Best Parameter Values for Accurate Classification
In this paper we examine the effect that the choice of support and confidence thresholds has on the accuracy of classifiers obtained by Classification Association Rule Mining. ...
Frans Coenen, Paul H. Leng
BIS
2006
99views Business» more  BIS 2006»
13 years 9 months ago
Challenges in IS Evolution Benefit Assessment
In this paper, the challenges of information system evolution benefit assessment are reviewed. Classical investment criteria and their advantages and disadvantages with respect to...
Irja Kankaanpää, Jussi Koskinen, Tero Ti...