Sciweavers

945 search results - page 73 / 189
» Detective Information Flow Analysis for Business Processes
Sort
View
ICSM
2002
IEEE
15 years 6 months ago
The Information Gathering Strategies of Software Maintainers
In examining software maintenance processes for improvement opportunities, an obvious choice is information flow. Obtaining accurate, up-to-date, and useful information about a sy...
Carolyn B. Seaman
TPDS
2008
78views more  TPDS 2008»
15 years 1 months ago
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach
To detect and investigate self-propagating worm attacks against networked servers, the following capabilities are desirable: (1) raising timely alerts to trigger a worm investigat...
Xuxian Jiang, Florian P. Buchholz, Aaron Walters, ...
ICMCS
2006
IEEE
130views Multimedia» more  ICMCS 2006»
15 years 8 months ago
Video Analysis and Compression on the STI Cell Broadband Engine Processor
With increased concern for physical security, video surveillance is becoming an important business area. Similar camera-based system can also be used in such diverse applications ...
Lurng-Kuo Liu, Sreeni Kesavarapu, Jonathan Connell...
ICRA
2005
IEEE
125views Robotics» more  ICRA 2005»
15 years 7 months ago
Bullwhip effect in Integrated Manufacturing and Service Networks
- An Integrated Manufacturing and Service Network (IMSN) is a grouping of companies, working together to offer a bundle of products and product-related services, that deliver value...
Nukala Viswanadham, Vijay Desai, Roshan S. Gaonkar
CADE
2008
Springer
16 years 2 months ago
Precise Dynamic Verification of Confidentiality
Confidentiality is maybe the most popular security property to be formally or informally verified. Noninterference is a baseline security policy to formalize confidentiality of sec...
Gurvan Le Guernic