Sciweavers

945 search results - page 52 / 189
» Detective Information Flow Analysis for Business Processes
Sort
View
BPM
2009
Springer
195views Business» more  BPM 2009»
15 years 8 months ago
Process Mining: Fuzzy Clustering and Performance Visualization
The goal of performance analysis of business processes is to gain insights into operational processes, for the purpose of optimizing them. To intuitively show which parts of the pr...
Boudewijn F. van Dongen, A. Adriansyah
126
Voted
SACMAT
2003
ACM
15 years 7 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
KBSE
2007
IEEE
15 years 8 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
94
Voted
NOLISP
2007
Springer
15 years 8 months ago
Phase-Based Methods for Voice Source Analysis
Voice source analysis is an important but difficult issue for speech processing. In this talk, three aspects of voice source analysis recently developed at LIMSI (Orsay, France) a...
Christophe d'Alessandro, Baris Bozkurt, Boris Dova...
129
Voted
IV
2010
IEEE
150views Visualization» more  IV 2010»
15 years 8 days ago
Supporting the Analytical Reasoning Process in Maritime Anomaly Detection: Evaluation and Experimental Design
Despite the growing number of systems providing visual analytic support for investigative analysis, few empirical studies include investigations on the analytical reasoning proces...
Maria Riveiro, Göran Falkman