Sciweavers

212 search results - page 36 / 43
» Automating function point analysis with model driven develop...
Sort
View
CCS
2009
ACM
15 years 6 months ago
Computational soundness for key exchange protocols with symmetric encryption
Formal analysis of security protocols based on symbolic models has been very successful in finding flaws in published protocols and proving protocols secure, using automated too...
Ralf Küsters, Max Tuengerthal
HICSS
2000
IEEE
131views Biometrics» more  HICSS 2000»
15 years 4 months ago
Workflow-based Process Monitoring and Controlling - Technical and Organizational Issues
Workflow management systems enable the exact and timely analysis of automated business processes through the analysis of the logged audit trail data. Within the research project C...
Michael zur Muehlen, Michael Rosemann
PDP
1996
IEEE
15 years 3 months ago
Application-Dependent Performability Evaluation of Fault-Tolerant Multiprocessors
A case study of performance and dependability evaluation of fault-tolerant multiprocessors is presented. Two specific architectures are analyzed taking into account system functio...
Stefan Dalibor, A. Hein, Wolfgang Hohl
ICASSP
2010
IEEE
14 years 12 months ago
Swift: Scalable weighted iterative sampling for flow cytometry clustering
Flow cytometry (FC) is a powerful technology for rapid multivariate analysis and functional discrimination of cells. Current FC platforms generate large, high-dimensional datasets...
Iftekhar Naim, Suprakash Datta, Gaurav Sharma, Jam...
ML
2006
ACM
143views Machine Learning» more  ML 2006»
14 years 11 months ago
Mathematical applications of inductive logic programming
The application of Inductive Logic Programming to scientific datasets has been highly successful. Such applications have led to breakthroughs in the domain of interest and have dri...
Simon Colton, Stephen Muggleton