Sciweavers

1407 search results - page 78 / 282
» Using Use Cases in Executable Z
Sort
View
IJNSEC
2010
145views more  IJNSEC 2010»
14 years 10 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh
GI
2007
Springer
15 years 10 months ago
SIPKIS - Individualisierte Beratungssysteme
Abstract: Im folgenden Beitrag wird ein Überblick über ein Konzept zur Individualisierung von Finanzdienstleistungsberatungen gegeben. Hierfür wird zunächst die Notwendigkeit f...
Veronica Winkler, Hans Ulrich Buhl
ESA
2008
Springer
96views Algorithms» more  ESA 2008»
15 years 5 months ago
Stabbing Convex Polygons with a Segment or a Polygon
Let O = {O1, . . . , Om} be a set of m convex polygons in R2 with a total of n vertices, and let B be another convex k-gon. A placement of B, any congruent copy of B (without refle...
Pankaj K. Agarwal, Danny Z. Chen, Shashidhara K. G...
ICDM
2005
IEEE
190views Data Mining» more  ICDM 2005»
15 years 9 months ago
Adaptive Clustering: Obtaining Better Clusters Using Feedback and Past Experience
Adaptive clustering uses external feedback to improve cluster quality; past experience serves to speed up execution time. An adaptive clustering environment is proposed that uses ...
Abraham Bagherjeiran, Christoph F. Eick, Chun-Shen...
EUROSYS
2010
ACM
15 years 8 months ago
Locating cache performance bottlenecks using data profiling
Effective use of CPU data caches is critical to good performance, but poor cache use patterns are often hard to spot using existing execution profiling tools. Typical profilers at...
Aleksey Pesterev, Nickolai Zeldovich, Robert T. Mo...