Sciweavers

1336 search results - page 71 / 268
» Modelling and Analysis of PKI-Based Systems Using Process Ca...
Sort
View
145
Voted
SPIN
2009
Springer
15 years 10 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
208
Voted
TII
2011
206views Education» more  TII 2011»
14 years 10 months ago
Timing-Failure Risk Assessment of UML Design Using Time Petri Net Bound Techniques
Abstract—Software systems that do not meet their timing constraints can cause risks. In this work, we propose a comprehensive method for assessing the risk of timing failure by e...
Simona Bernardi, Javier Campos, José Merseg...
127
Voted
QEST
2009
IEEE
15 years 10 months ago
Exploiting Restricted Transitions in Quasi-Birth-and-Death Processes
—In this paper we consider Quasi-Birth-and-Death (QBD) processes where the upward (resp. downward) transitions are restricted to occur only from (resp. to) a subset of the phase ...
Juan F. Pérez, Benny Van Houdt
138
Voted
IS
2008
15 years 3 months ago
Conformance checking of processes based on monitoring real behavior
Many companies have adopted Process-aware Information Systems (PAIS) to support their business processes in some form. On the one hand these systems typically log events (e.g., in ...
Anne Rozinat, Wil M. P. van der Aalst
NLPRS
2001
Springer
15 years 7 months ago
A New Prosodic Phrasing Model for Chinese TTS Systems
This paper proposes a new prosodic phrasing model for Chinese text-tospeech systems. First, in contrast to the commonly used CART techniques, we propose a new inductive learning a...
Weijun Chen, Fuzong Lin, Jianmin Li, Bo Zhang