Sciweavers

2270 search results - page 125 / 454
» The Quality of Knowledge: Knowledge Patterns and Knowledge R...
Sort
View
CCS
2008
ACM
13 years 11 months ago
Enforcing a security pattern in stakeholder goal models
Patterns are useful knowledge about recurring problems and solutions. Detecting a security problem using patterns in requirements models may lead to its early solution. In order t...
Yijun Yu, Haruhiko Kaiya, Hironori Washizaki, Ying...
DEXAW
2009
IEEE
111views Database» more  DEXAW 2009»
14 years 4 months ago
Integrating Security Patterns into the Electronic Invoicing Process
—The increasing automation of business processes is one of the main benefits of the ongoing technological evolution. Regarding e-invoices this automation process is still not op...
Michael Netter, Günther Pernul
IRI
2005
IEEE
14 years 2 months ago
AnyInformationHiding: a stable design pattern
The AnyInformationHiding design pattern models the concept of information hiding and the interactions between parties associated with it in any application. Information hiding is ...
Mohamed Fayad, Haritha Kilaru
IJAR
2006
92views more  IJAR 2006»
13 years 9 months ago
Possibilistic clustering approach to trackless ring Pattern Recognition in RICH counters
The pattern recognition problem in Ring Imaging CHerenkov (RICH) counters concerns the identification of an unknown number of rings whose centers and radii are assumed to be unkno...
A. M. Massone, Léonard Studer, Francesco Ma...
ML
2008
ACM
13 years 9 months ago
Layered critical values: a powerful direct-adjustment approach to discovering significant patterns
Standard pattern discovery techniques, such as association rules, suffer an extreme risk of finding very large numbers of spurious patterns for many knowledge discovery tasks. The...
Geoffrey I. Webb