Sciweavers

963 search results - page 165 / 193
» Formal Analysis of BPMN Models Using Event-B
Sort
View
ECBS
2007
IEEE
161views Hardware» more  ECBS 2007»
15 years 5 months ago
Alert Fusion for a Computer Host Based Intrusion Detection System
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
ER
2010
Springer
104views Database» more  ER 2010»
15 years 2 months ago
Provenance Management in BioSciences
: Data provenance is becoming increasingly important for biosciences with the advent of large-scale collaborative environments such as the iPlant collaborative, where scientists co...
Sudha Ram, Jun Liu
MANSCI
2007
88views more  MANSCI 2007»
15 years 3 months ago
The Timing of Resource Development and Sustainable Competitive Advantage
We develop a formal model of the timing of resource development by competing …rms. Our aim is to deepen and extend resource-level theorizing about sustainable competitive advant...
Gonçalo Pacheco-de-Almeida, Peter Zemsky
EDBT
2009
ACM
136views Database» more  EDBT 2009»
15 years 10 months ago
On the comparison of microdata disclosure control algorithms
Privacy models such as k-anonymity and -diversity typically offer an aggregate or scalar notion of the privacy property that holds collectively on the entire anonymized data set....
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
FMCAD
2004
Springer
15 years 9 months ago
Proof Styles in Operational Semantics
Abstract. We relate two well-studied methodologies in deductive verification of operationally modeled sequential programs, namely the use of inductive invariants and clock functio...
Sandip Ray, J. Strother Moore