Sciweavers

945 search results - page 79 / 189
» Detective Information Flow Analysis for Business Processes
Sort
View
CN
1999
115views more  CN 1999»
15 years 1 months ago
A large scale distributed intrusion detection framework based on attack strategy analysis
To appropriately address the problem of large-scale distributed intrusion assessment/detection, issues such as information exchange, work division and coordination amongst various...
Ming-Yuh Huang, Robert J. Jasper, Thomas M. Wicks
ICMCS
2005
IEEE
170views Multimedia» more  ICMCS 2005»
15 years 7 months ago
Affective content analysis in comedy and horror videos by audio emotional event detection
We study the problem of affective content analysis. In this paper we think of affective contents as those video/audio segments, which may cause an audience’s strong reactions or...
Min Xu, Liang-Tien Chia, Jesse S. Jin
130
Voted
DATE
2006
IEEE
133views Hardware» more  DATE 2006»
15 years 8 months ago
Analysis and synthesis of quantum circuits by using quantum decision diagrams
Quantum information processing technology is in its pioneering stage and no proficient method for synthesizing quantum circuits has been introduced so far. This paper introduces a...
Afshin Abdollahi, Massoud Pedram
IJACTAICIT
2010
117views more  IJACTAICIT 2010»
14 years 11 months ago
Qualitative Analysis on Matchmaking Techniques for Web Service Discovery
The ample adoption of web services raises the challenging problem in web service discovery. Web service discovery is the process of finding appropriate services for the user defin...
P. Dharanyadevi, P. Dhavachelvan, R. Baskaran, V. ...
CAISE
1999
Springer
15 years 6 months ago
Modeling Dynamic Domains with ConGolog
In this paper, we describe the process specification language ConGolog and show how it can be used to model business processes for requirements analysis. In ConGolog, the effects...
Yves Lespérance, Todd G. Kelley, John Mylop...