Sciweavers

674 search results - page 87 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
ICAIL
2003
ACM
14 years 3 months ago
A Model Based Reasoning Approach for Generating Plausible Crime Scenarios from Evidence
Robust decision support systems (DSSs) for crime investigation are difficult to construct because of the almost infinite variation of plausible crime scenarios. Thus, existing ap...
Jeroen Keppens, John Zeleznikow
DSN
2008
IEEE
13 years 12 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
ECRTS
2008
IEEE
14 years 4 months ago
Temporal Analysis for Adapting Concurrent Applications to Embedded Systems
Embedded services and applications that interact with the real world often, over time, need to run on different kinds of hardware (low-cost microcontrollers to powerful multicore ...
Sibin Mohan, Johannes Helander
CEC
2010
IEEE
13 years 11 months ago
An analysis of massively distributed evolutionary algorithms
Computational science is placing new demands on optimization algorithms as the size of data sets and the computational complexity of scientific models continue to increase. As thes...
Travis J. Desell, David P. Anderson, Malik Magdon-...
NECO
2008
101views more  NECO 2008»
13 years 10 months ago
On the Classification Capability of Sign-Constrained Perceptrons
The perceptron (also referred to as McCulloch-Pitts neuron, or linear threshold gate) is commonly used as a simplified model for the discrimination and learning capability of a bi...
Robert A. Legenstein, Wolfgang Maass