Sciweavers

2216 search results - page 334 / 444
» Hedging Structured Concepts
Sort
View
NSPW
2004
ACM
15 years 10 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
115
Voted
SAC
2004
ACM
15 years 10 months ago
A relational approach to software metrics
There is still no standardization of software measures and metrics extraction tools have to be updated frequently to handle the changes. A possible solution is represented by usin...
Marco Scotto, Alberto Sillitti, Giancarlo Succi, T...
AOSE
2004
Springer
15 years 10 months ago
A Study of Some Multi-agent Meta-models
Several agent-oriented methodologies have been proposed over the last few years. Unlike the object-oriented domain and unfortunately for designers, most of the time, each methodolo...
Carole Bernon, Massimo Cossentino, Marie Pierre Gl...
BIRTHDAY
2004
Springer
15 years 10 months ago
Der 'Nietzsche-Thesaurus' des Nietzsche-Online-Portals
The ‚Nietzsche-Thesaurus’ ist part of an Internet-Portal to the German philosopher Friedrich Nietzsche (under construction). By using the complex Index of a Citation Lexicon (...
Harald Zimmermann
BPM
2004
Springer
167views Business» more  BPM 2004»
15 years 10 months ago
Mining Social Networks: Uncovering Interaction Patterns in Business Processes
Increasingly information systems log historic information in a systematic way. Workflow management systems, but also ERP, CRM, SCM, and B2B systems often provide a so-called “ev...
Wil M. P. van der Aalst, Minseok Song