Buscar
Mostrando ítems 1-10 de 145
Ponencia
Definition and Verification of Security Configurations of Cyber-Physical Systems
(Springer, 2020)
The proliferation of Cyber-Physical Systems (CPSs) is rais ing serious security challenges. These are complex systems, integrating physical elements into automated networked systems, often containing a variety of devices, ...
Capítulo de Libro
Learning Robust Dynamic Networks in Prokaryotes by Gene Expression Networks Iterative Explorer (GENIE)
(Springer, 2008)
Genetic and genomic approaches have been used successfully to assign genes to distinct regulatory networks, but the uncertainty concerning the connec tions between genes, the ambiguity inherent to the biological processes, ...
Ponencia
Improving the Diagnosability of Business Process Management Systems Using Test Points
(Springer, 2010)
The management and automation of business processes have become an essential task within IT organizations, where the diagnosis is a very important issue, since it enables fault isolation in a business process. The ...
Capítulo de Libro
Diagnosing Business Processes
(Springer, 2019)
Ponencia
An Evolutionary Approach for Protein Contact Map Prediction
(Springer, 2011)
In this study, we present a residue-residue contact prediction approach based on evolutionary computation. Some amino acid properties are employed according to their importance in the folding process: hydrophobicity, ...
Artículo
A Two-Stage Algorithm in Evolutionary Product Unit Neural Networks for Classification
(Elsevier, 2011-01)
This paper presents a procedure to add broader diversity at the beginning of the evolutionary process. It consists of creating two initial populations with different parameter settings, evolving them for a small number of ...
Ponencia
Querying a Polynomial Object-Relational Constraint Database in Model-Based Diagnosis
(Springer, 2005)
Many papers related to Constraint Databases (CDBs) theories exist, including proposals that present frameworks for the treatment of constraints as a new data type. Our proposal presents a new way of storing and manipulating ...
Artículo
CyberSPL: Framework for the verification of cybersecurity policy compliance of system configurations using software product lines
(MDPI, 2019)
Cybersecurity attacks affect the compliance of cybersecurity policies of the organisations. Such disadvantages may be due to the absence of security configurations or the use of default configuration values of software ...
Ponencia
Measuring the Quality of Shifting and Scaling Patterns in Biclusters
(Springer, 2010)
The most widespread biclustering algorithms use the Mean Squared Residue (MSR) as measure for assessing the quality of biclusters. MSR can identify correctly shifting patterns, but fails at discovering biclusters presenting ...
Ponencia
Una propuesta usando Restricciones para la toma de decisiones en la tolerancia a fallos en procesos de negocio
(Mondragón Unibertsitatea, 2009)
Cuando un proceso de negocio no obtiene el objetivo que se propone será necesario realizar una diagnosis y detección de errores, descubriendo qué servicios están funcionando de forma incorrecta para su sustitución. El ...