Sciweavers

2005 search results - page 88 / 401
» Business Process Knowledge Modelling: Method and Tool
Sort
View
DEXAW
2003
IEEE
93views Database» more  DEXAW 2003»
15 years 3 months ago
A business process-driven approach to security engineering
A challenging task in security engineering concerns the specification and integration of security with other requirements at the top level of requirements engineering. Empirical ...
Antonio Mana, José A. Montenegro, Carsten R...
ETS
2002
IEEE
129views Hardware» more  ETS 2002»
14 years 9 months ago
Introducing the Strawberry Discovery and Niche Process
The Strawberry Discovery and Niche Process (SDNP) introduces a workbook, a new systematic method, a compact and cost-effective training process. The trainees are directed in a sys...
Kristiina Annala
SACMAT
2003
ACM
15 years 3 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
ASWC
2008
Springer
14 years 12 months ago
ROC: A Method for Proto-ontology Construction by Domain Experts
Abstract. Ontology construction is a labour-intensive and costly process. Even though many formal and semi-formal vocabularies are available, creating an ontology for a specific ap...
Nicole J. J. P. Koenderink, Mark van Assem, J. Lar...
EACL
1993
ACL Anthology
14 years 11 months ago
Data-Oriented Methods for Grapheme-to-Phoneme Conversion
It is traditionally assumed that various sources of linguistic knowledge and their interaction should be formalised in order to be able to convert words into their phonemic repres...
Antal van den Bosch, Walter Daelemans