Sciweavers

945 search results - page 63 / 189
» Detective Information Flow Analysis for Business Processes
Sort
View
139
Voted
BPM
2009
Springer
157views Business» more  BPM 2009»
15 years 3 months ago
ProM: The Process Mining Toolkit
Nowadays, all kinds of information systems store detailed information in logs. Examples of such systems include classical workflow management systems (Staffware), ERP systems (SAP)...
Wil M. P. van der Aalst, Boudewijn F. van Dongen, ...
EMNLP
2009
14 years 11 months ago
Using Morphological and Syntactic Structures for Chinese Opinion Analysis
This paper employs morphological structures and relations between sentence segments for opinion analysis on words and sentences. Chinese words are classified into eight morphologi...
Lun-Wei Ku, Ting-Hao Huang, Hsin-Hsi Chen
109
Voted
IJISEC
2008
119views more  IJISEC 2008»
15 years 1 months ago
Estimating the maximum information leakage
Preventing improper information leaks is a greatest challenge of the modern society. In this paper we present a technique for measuring the ability of several families of adversari...
Alessandro Aldini, Alessandra Di Pierro
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 8 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
144
Voted
ICIP
2007
IEEE
15 years 5 months ago
Real-Time Pedestrian Detection using Eigenflow
We propose a novel learning algorithm to detect moving pedestrians from a stationary camera in real-time. The algorithm learns a discriminative model based on eigenflow, i.e. the ...
Dhiraj Goel, Tsuhan Chen