Sciweavers

12833 search results - page 40 / 2567
» A Process to Effectively Identify
Sort
View
AAAI
2004
15 years 1 months ago
Identifying Terrorist Activity with AI Plan Recognition Technology
We describe the application of plan recognition techniques to support human intelligence analysts in processing national security alert sets by automatically identifying the hosti...
Peter Jarvis, Teresa F. Lunt, Karen L. Myers
ICIP
2006
IEEE
16 years 1 months ago
Digital Image Forensics for Identifying Computer Generated and Digital Camera Images
We describe a digital image forensics technique to distinguish images captured by a digital camera from computer generated images. Our approach is based on the fact that image acq...
Sintayehu Dehnie, Husrev T. Sencar, Nasir D. Memon
SPIN
2009
Springer
15 years 6 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
BPM
2009
Springer
145views Business» more  BPM 2009»
15 years 6 months ago
Effect of Using Automated Auditing Tools on Detecting Compliance Failures in Unmanaged Processes
The effect of using automated auditing tools to detect compliance failures in unmanaged business processes is investigated. In the absence of a process execution engine, compliance...
Yurdaer N. Doganata, Francisco Curbera
CORR
2010
Springer
119views Education» more  CORR 2010»
14 years 6 months ago
Effective complexity of stationary process realizations
The concept of effective complexity of an object as the minimal description length of its regularities has been initiated by Gell-Mann and Lloyd. The regularities are modeled by m...
Nihat Ay, Markus Müller, Arleta Szkola