Sciweavers

9730 search results - page 301 / 1946
» Relating models of backtracking
Sort
View
SAC
2002
ACM
15 years 4 months ago
Collaborative attack modeling
Avoidance and discovery of security vulnerabilities in information systems requires awareness of typical risks and a good understanding of vulnerabilities and their exploitations....
Jan Steffan, Markus Schumacher
IJBC
2010
77views more  IJBC 2010»
14 years 11 months ago
Spatio-Temporal Chaos in a Discrete Turing Model
In this paper, a discrete version of a reaction-diffusion equation, also known as coupled map lattice (CML), which corresponds to the Turing model of morphogenesis is studied. It i...
Hunseok Kang
EOR
2011
131views more  EOR 2011»
14 years 8 months ago
Personnel scheduling: Models and complexity
Due to its complexity, its challenging features, and its practical relevance, personnel scheduling has been heavily investigated in the last few decades. However, there is a relati...
Peter Brucker, Rong Qu, Edmund K. Burke
PKDD
2007
Springer
102views Data Mining» more  PKDD 2007»
15 years 11 months ago
Towards Data Mining Without Information on Knowledge Structure
Most knowledge discovery processes are biased since some part of the knowledge structure must be given before extraction. We propose a framework that avoids this bias by supporting...
Alexandre Vautier, Marie-Odile Cordier, Rene Quini...
DATAMINE
2006
117views more  DATAMINE 2006»
15 years 4 months ago
A Rule-Based Approach for Process Discovery: Dealing with Noise and Imbalance in Process Logs
Effective information systems require the existence of explicit process models. A completely specified process design needs to be developed in order to enact a given business proce...
Laura Maruster, A. J. M. M. Weijters, Wil M. P. va...