Sciweavers

5847 search results - page 993 / 1170
» Visualization of Knowledge Structures
Sort
View
NSPW
2004
ACM
15 years 7 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
CAISE
2004
Springer
15 years 7 months ago
Business Alignment: Using Process Mining as a Tool for Delta Analysis
Fueled by the omnipresence of event logs in transactional information systems (cf. WFM, ERP, CRM, SCM, and B2B systems), process mining has become a vivid research area. Until rece...
Wil M. P. van der Aalst
103
Voted
CCS
2004
ACM
15 years 7 months ago
Formally verifying information flow type systems for concurrent and thread systems
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using the proof assistant Isabelle/HOL, we have machine-checked a recent work of B...
Gilles Barthe, Leonor Prensa Nieto
CSLP
2004
Springer
15 years 7 months ago
Gradience, Constructions and Constraint Systems
Abstract. This paper is concerned with the question of quantifying gradient degrees of acceptability by introducing the notion of Density in the context of constructional constrain...
Philippe Blache, Jean-Philippe Prost
116
Voted
ECAI
2004
Springer
15 years 7 months ago
The KGP Model of Agency
This paper presents a new model of agency, called the KGP (Knowledge, Goals and Plan) model. This draws from the classic BDI model and proposes a hierarchical agent architecture wi...
Antonis C. Kakas, Paolo Mancarella, Fariba Sadri, ...