Sciweavers

5465 search results - page 91 / 1093
» Assigning Types to Processes
Sort
View
IDEAL
2010
Springer
14 years 8 months ago
Typed Linear Chain Conditional Random Fields and Their Application to Intrusion Detection
Intrusion detection in computer networks faces the problem of a large number of both false alarms and unrecognized attacks. To improve the precision of detection, various machine l...
Carsten Elfers, Mirko Horstmann, Karsten Sohr, Ott...
HICSS
1997
IEEE
151views Biometrics» more  HICSS 1997»
15 years 2 months ago
Intelligent Agent Based Contract Process in Electronic Commerce: UNIK-AGENT Approach
As the second generation of electronic commerce, the framework of agent based commerce is proposed. Since the communication messages and solution methods of agents are significant...
Jae Kyu Lee, Woongkyu Lee
AMAST
2008
Springer
14 years 12 months ago
A Formal Analysis of Complex Type Flaw Attacks on Security Protocols
A simple type confusion attack occurs in a security protocol, when a principal interprets data of one type as data of another. These attacks can be successfully prevented by \taggi...
Han Gao, Chiara Bodei, Pierpaolo Degano
BMCBI
2010
127views more  BMCBI 2010»
14 years 10 months ago
Computational prediction of type III secreted proteins from gram-negative bacteria
Background: Type III secretion system (T3SS) is a specialized protein delivery system in gramnegative bacteria that injects proteins (called effectors) directly into the eukaryoti...
Yang Yang, Jiayuan Zhao, Robyn L. Morgan, Wenbo Ma...
BPM
2005
Springer
102views Business» more  BPM 2005»
15 years 3 months ago
Integrating Process Learning and Process Evolution - A Semantics Based Approach
Companies are developing a growing interest in aligning their information systems in a process-oriented way. However, current processaware information systems (PAIS) fail to meet p...
Stefanie Rinderle, Barbara Weber, Manfred Reichert...