Sciweavers

674 search results - page 107 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
113
Voted
DKE
2006
84views more  DKE 2006»
15 years 2 months ago
Mining configurable enterprise information systems
Process mining is the extraction of a process model from system logs. These logs have to meet minimum requirements, i.e. each event should refer to a case and a task. Many system ...
Monique H. Jansen-Vullers, Wil M. P. van der Aalst...
144
Voted
HYBRID
1998
Springer
15 years 7 months ago
Formal Verification of Safety-Critical Hybrid Systems
This paper investigates how formal techniques can be used for the analysis and verification of hybrid systems [1,5,7,16] -- systems involving both discrete and continuous behavior....
Carolos Livadas, Nancy A. Lynch
ML
2012
ACM
385views Machine Learning» more  ML 2012»
13 years 10 months ago
An alternative view of variational Bayes and asymptotic approximations of free energy
Bayesian learning, widely used in many applied data-modeling problems, is often accomplished with approximation schemes because it requires intractable computation of the posterio...
Kazuho Watanabe
DAGSTUHL
2001
15 years 4 months ago
JaVis: A UML-Based Visualization and Debugging Environment for Concurrent Java Programs
Debugging concurrent Java programs is a difficult task because of multiple control flows and inherent nondeterminism. It requires techniques not provided by traditional debuggers ...
Katharina Mehner
ECOOP
2009
Springer
16 years 3 months ago
Fine-Grained Access Control with Object-Sensitive Roles
Role-based access control (RBAC) is a common paradigm to ensure that users have sufficient rights to perform various system operations. In many cases though, traditional RBAC does ...
Jeffrey Fischer, Daniel Marino, Rupak Majumdar, To...