Sciweavers

2695 search results - page 337 / 539
» A Visual Approach to Validating System Level Designs
Sort
View
SAC
2010
ACM
15 years 10 months ago
Ontology-based generation of IT-security metrics
Legal regulations and industry standards require organizations to measure and maintain a specified IT-security level. Although several IT-security metrics approaches have been de...
Stefan Fenz
FLAIRS
2001
15 years 5 months ago
Facilitating the Exchange of Explicit Knowledge through Ontology Mappings
In this paper, we give an overview of a system (CAIMAN) that can facilitate the exchange of relevant documents between geographically dispersed people in Communities of Interest. ...
Martin S. Lacher, Georg Groh
JDWM
2007
112views more  JDWM 2007»
15 years 3 months ago
Empowering the OLAP Technology to Support Complex Dimension Hierarchies
Comprehensive data analysis has become indispensable in a variety of domains. OLAP (On-Line Analytical Processing) systems tend to perform poorly or even fail when applied to comp...
Svetlana Mansmann, Marc H. Scholl
BMCBI
2007
182views more  BMCBI 2007»
15 years 3 months ago
Additive risk survival model with microarray data
Background: Microarray techniques survey gene expressions on a global scale. Extensive biomedical studies have been designed to discover subsets of genes that are associated with ...
Shuangge Ma, Jian Huang
KBSE
2007
IEEE
15 years 10 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr