Sciweavers

14 search results - page 1 / 3
» Mining for insider threats in business transactions and proc...
Sort
View
CIDM
2009
IEEE
13 years 11 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder
COOPIS
2003
IEEE
13 years 10 months ago
Porting OMTTs to CORBA
The Common Object Request Broker Architecture standardizes a platform- and programming-language-independent distributed object computing environment. It also provides a standard fo...
Raul Silaghi, Alfred Strohmeier, Jörg Kienzle
CAISE
2004
Springer
13 years 10 months ago
Business Alignment: Using Process Mining as a Tool for Delta Analysis
Fueled by the omnipresence of event logs in transactional information systems (cf. WFM, ERP, CRM, SCM, and B2B systems), process mining has become a vivid research area. Until rece...
Wil M. P. van der Aalst
BPM
2006
Springer
153views Business» more  BPM 2006»
13 years 8 months ago
Decision Mining in ProM
Process-aware Information Systems typically log events (e.g., in transaction logs or audit trails) related to the actual business process executions. Proper analysis of these execu...
Anne Rozinat, Wil M. P. van der Aalst
OSDI
2000
ACM
13 years 6 months ago
Towards Higher Disk Head Utilization: Extracting "Free" Bandwidth from Busy Disk Drives
Freeblock scheduling is a new approach to utilizing more of disks' potential media bandwidths. By filling rotational latency periods with useful media transfers, 20{50% of a ...
Christopher R. Lumb, Jiri Schindler, Gregory R. Ga...