Sciweavers

674 search results - page 42 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
AI
2008
Springer
14 years 9 months ago
Reachability analysis of uncertain systems using bounded-parameter Markov decision processes
Verification of reachability properties for probabilistic systems is usually based on variants of Markov processes. Current methods assume an exact model of the dynamic behavior a...
Di Wu, Xenofon D. Koutsoukos
ICASSP
2011
IEEE
14 years 1 months ago
An extension of the ICA model using latent variables
The Independent Component Analysis (ICA) model is extended to the case where the components are not necessarily independent: depending on the value a hidden latent process at the ...
Selwa Rafi, Marc Castella, Wojciech Pieczynski
EDBTW
2004
Springer
15 years 3 months ago
The Case for Mobile OLAP
Abstract. On-Line Analytical Processing (OLAP) is a trend in database technology, based on the multidimensional view of data. Numerous applications and development environments exi...
Andreas S. Maniatis
AUSAI
2008
Springer
14 years 11 months ago
Propositionalisation of Profile Hidden Markov Models for Biological Sequence Analysis
Hidden Markov Models are a widely used generative model for analysing sequence data. A variant, Profile Hidden Markov Models are a special case used in Bioinformatics to represent,...
Stefan Mutter, Bernhard Pfahringer, Geoffrey Holme...
AINA
2007
IEEE
15 years 4 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl