Sciweavers

20833 search results - page 3968 / 4167
» Hidden process models
Sort
View
SP
2008
IEEE
176views Security Privacy» more  SP 2008»
15 years 10 months ago
Casting out Demons: Sanitizing Training Data for Anomaly Sensors
The efficacy of Anomaly Detection (AD) sensors depends heavily on the quality of the data used to train them. Artificial or contrived training data may not provide a realistic v...
Gabriela F. Cretu, Angelos Stavrou, Michael E. Loc...
VR
2008
IEEE
188views Virtual Reality» more  VR 2008»
15 years 10 months ago
The Two-User Seating Buck: Enabling Face-to-Face Discussions of Novel Car Interface Concepts
The automotive industry uses physical seating bucks, which are minimal mockups of a car interior, to assess various aspects of the planned interior early in the development proces...
Holger Salzmann, Bernd Froehlich
AB
2008
Springer
15 years 10 months ago
An Algorithm for Qualitative Simulation of Gene Regulatory Networks with Steep Sigmoidal Response Functions
A specific class of ODEs has been shown to be adequate to describe the essential features of the complex dynamics of Gene-Regulatory Networks (GRN). But, the effective exploitatio...
Liliana Ironi, Luigi Panzeri, Erik Plahte
ICTAI
2007
IEEE
15 years 10 months ago
Establishing Logical Rules from Empirical Data
We review a method of generating logical rules, or axioms, from empirical data. This method, using closed set properties of formal concept analysis, has been previously described ...
John L. Pfaltz
136
Voted
IEEESCC
2007
IEEE
15 years 10 months ago
Deriving executable BPEL from UMM Business Transactions
UN/CEFACT’s Modeling Methodology (UMM) is a UML profile for modeling global B2B choreographies. The basic building blocks of UMM are business transactions, which describe the e...
Birgit Hofreiter, Christian Huemer, Philipp Liegl,...
« Prev « First page 3968 / 4167 Last » Next »