Sciweavers

6047 search results - page 325 / 1210
» Modeling with Extend
Sort
View
APCCM
2006
15 years 6 months ago
Process modelling: the deontic way
Current enterprise systems rely heavily on the modelling and enactment of business processes. One of the key criteria for a business process is to represent not just the behaviour...
Vineet Padmanabhan, Guido Governatori, Shazia Wasi...
FASE
2005
Springer
15 years 10 months ago
Using Scenarios to Predict the Reliability of Concurrent Component-Based Software Systems
Scenarios are a popular means for capturing behavioural requirements of software systems early in the lifecycle. Scenarios show how components interact to provide system level func...
Genaína Nunes Rodrigues, David S. Rosenblum...
ICICS
2003
Springer
15 years 10 months ago
A Compound Intrusion Detection Model
Intrusion detection systems (IDSs) have become a critical part of security systems. The goal of an intrusion detection system is to identify intrusion effectively and accurately. ...
Jianhua Sun, Hai Jin, Hao Chen, Qian Zhang, Zongfe...
ICITS
2009
15 years 2 months ago
Survey: Leakage Resilience and the Bounded Retrieval Model
Abstract. This survey paper studies recent advances in the field of LeakageResilient Cryptography. This booming area is concerned with the design of cryptographic primitives resist...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
142
Voted
AIME
2007
Springer
15 years 11 months ago
Predictive Modeling of fMRI Brain States Using Functional Canonical Correlation Analysis
We present a novel method for predictive modeling of human brain states from functional neuroimaging (fMRI) data. Extending the traditional canonical correlation analysis of discre...
Sennay Ghebreab, Arnold W. M. Smeulders, Pieter W....