Sciweavers

76 search results - page 4 / 16
» A Framework to Detect Deviations During Process Enactment
Sort
View
DBSEC
2010
123views Database» more  DBSEC 2010»
14 years 10 months ago
Evaluating the Risk of Adopting RBAC Roles
We propose a framework to evaluate the risk incurred when managing users and permissions through RBAC. The risk analysis framework does not require roles to be defined, thus making...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
15 years 3 months ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
ICMCS
2007
IEEE
138views Multimedia» more  ICMCS 2007»
15 years 4 months ago
Differentiated Service Protection of Multimedia Transmission via Detection of Traffic Anomalies
Multimedia transmission over the Internet has its quality of service (QoS) requirement. However, Denial-of-Service (DoS) attacks launch large volumes of traffic and consume networ...
Hongli Luo, Mei-Ling Shyu
CVPR
2001
IEEE
16 years 6 days ago
Dimension Recognition and Geometry Reconstruction in Vectorization of Engineering Drawings
This paper presents a novel approach for recognizing and interpreting dimensions in engineering drawings. It starts by detecting potential dimension frames, each comprising only t...
Feng Su, Jiqiang Song, Chiew-Lan Tai, Shijie Cai
ICPR
2006
IEEE
15 years 11 months ago
Detection of presynaptic terminals on dendritic spines in double labeling confocal images
For the analysis of learning processes and the underlying changes of the shape of excitatory synapses (spines), 3-D volume samples of selected dendritic segments are scanned by a ...
Andreas Herzog, Bernd Michaelis, Gerald Krell, Kat...