Skip to main content

Showing 1–33 of 33 results for author: Weber, B

  1. arXiv:2407.01529  [pdf, other

    cs.CR cs.LG

    On the Abuse and Detection of Polyglot Files

    Authors: Luke Koch, Sean Oesch, Amul Chaulagain, Jared Dixon, Matthew Dixon, Mike Huettal, Amir Sadovnik, Cory Watson, Brian Weber, Jacob Hartman, Richard Patulski

    Abstract: A polyglot is a file that is valid in two or more formats. Polyglot files pose a problem for malware detection systems that route files to format-specific detectors/signatures, as well as file upload and sanitization tools. In this work we found that existing file-format and embedded-file detection tools, even those developed specifically for polyglot files, fail to reliably detect polyglot files… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

    Comments: 18 pages, 11 figures

  2. arXiv:2405.08528  [pdf, other

    cs.SE cs.AI

    From Internet of Things Data to Business Processes: Challenges and a Framework

    Authors: Juergen Mangler, Ronny Seiger, Janik-Vasily Benzin, Joscha Grüger, Yusuf Kirikkayis, Florian Gallik, Lukas Malburg, Matthias Ehrendorfer, Yannis Bertrand, Marco Franceschetti, Barbara Weber, Stefanie Rinderle-Ma, Ralph Bergmann, Estefanía Serral Asensio, Manfred Reichert

    Abstract: The IoT and Business Process Management (BPM) communities co-exist in many shared application domains, such as manufacturing and healthcare. The IoT community has a strong focus on hardware, connectivity and data; the BPM community focuses mainly on finding, controlling, and enhancing the structured interactions among the IoT devices in processes. While the field of Process Mining deals with the e… ▽ More

    Submitted 22 May, 2024; v1 submitted 14 May, 2024; originally announced May 2024.

    ACM Class: H.3.3; I.2.1

  3. arXiv:2405.01244  [pdf, other

    cs.IT cond-mat.stat-mech

    Stability of Information in the Heat Flow Clustering

    Authors: Brian Weber

    Abstract: Clustering methods must be tailored to the dataset it operates on, as there is no objective or universal definition of ``cluster,'' but nevertheless arbitrariness in the clustering method must be minimized. This paper develops a quantitative ``stability'' method of determining clusters, where stable or persistent clustering signals are used to indicate real structures have been identified in the u… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    ACM Class: G.m

  4. arXiv:2404.10788  [pdf, other

    cs.CR cs.AI

    The Path To Autonomous Cyber Defense

    Authors: Sean Oesch, Phillipe Austria, Amul Chaulagain, Brian Weber, Cory Watson, Matthew Dixson, Amir Sadovnik

    Abstract: Defenders are overwhelmed by the number and scale of attacks against their networks.This problem will only be exacerbated as attackers leverage artificial intelligence to automate their workflows. We propose a path to autonomous cyber agents able to augment defenders by automating critical steps in the cyber defense life cycle.

    Submitted 12 April, 2024; originally announced April 2024.

    Comments: 9 pages, 3 figures

  5. arXiv:2312.14322  [pdf, other

    cond-mat.mes-hall cs.DB cs.LG quant-ph

    Data Needs and Challenges of Quantum Dot Devices Automation: Workshop Report

    Authors: Justyna P. Zwolak, Jacob M. Taylor, Reed Andrews, Jared Benson, Garnett Bryant, Donovan Buterakos, Anasua Chatterjee, Sankar Das Sarma, Mark A. Eriksson, Eliška Greplová, Michael J. Gullans, Fabian Hader, Tyler J. Kovach, Pranav S. Mundada, Mick Ramsey, Torbjoern Rasmussen, Brandon Severin, Anthony Sigillito, Brennan Undseth, Brian Weber

    Abstract: Gate-defined quantum dots are a promising candidate system to realize scalable, coupled qubit systems and serve as a fundamental building block for quantum computers. However, present-day quantum dot devices suffer from imperfections that must be accounted for, which hinders the characterization, tuning, and operation process. Moreover, with an increasing number of quantum dot qubits, the relevant… ▽ More

    Submitted 12 May, 2024; v1 submitted 21 December, 2023; originally announced December 2023.

    Comments: White paper/overview based on a workshop held at the National Institute of Standards and Technology, Gaithersburg, MD. 13 pages

  6. arXiv:2312.11206  [pdf, other

    cond-mat.mes-hall cs.CV quant-ph

    QDA$^2$: A principled approach to automatically annotating charge stability diagrams

    Authors: Brian Weber, Justyna P. Zwolak

    Abstract: Gate-defined semiconductor quantum dot (QD) arrays are a promising platform for quantum computing. However, presently, the large configuration spaces and inherent noise make tuning of QD devices a nontrivial task and with the increasing number of QD qubits, the human-driven experimental control becomes unfeasible. Recently, researchers working with QD systems have begun putting considerable effort… ▽ More

    Submitted 18 December, 2023; originally announced December 2023.

    Comments: 17 pages, 8 figures

  7. arXiv:2308.14835  [pdf, other

    cs.CR

    AI ATAC 1: An Evaluation of Prominent Commercial Malware Detectors

    Authors: Robert A. Bridges, Brian Weber, Justin M. Beaver, Jared M. Smith, Miki E. Verma, Savannah Norem, Kevin Spakes, Cory Watson, Jeff A. Nichols, Brian Jewell, Michael. D. Iannacone, Chelsey Dunivan Stahl, Kelly M. T. Huffer, T. Sean Oesch

    Abstract: This work presents an evaluation of six prominent commercial endpoint malware detectors, a network malware detector, and a file-conviction algorithm from a cyber technology vendor. The evaluation was administered as the first of the Artificial Intelligence Applications to Autonomous Cybersecurity (AI ATAC) prize challenges, funded by / completed in service of the US Navy. The experiment employed 1… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

  8. Testing SOAR Tools in Use

    Authors: Robert A. Bridges, Ashley E. Rice, Sean Oesch, Jeff A. Nichols, Cory Watson, Kevin Spakes, Savannah Norem, Mike Huettel, Brian Jewell, Brian Weber, Connor Gannon, Olivia Bizovi, Samuel C Hollifield, Samantha Erwin

    Abstract: Modern security operation centers (SOCs) rely on operators and a tapestry of logging and alerting tools with large scale collection and query abilities. SOC investigations are tedious as they rely on manual efforts to query diverse data sources, overlay related logs, and correlate the data into information and then document results in a ticketing system. Security orchestration, automation, and res… ▽ More

    Submitted 14 February, 2023; v1 submitted 11 August, 2022; originally announced August 2022.

    Journal ref: Computers & Security 2023

  9. arXiv:2203.07561  [pdf, other

    cs.CR cs.LG

    Toward the Detection of Polyglot Files

    Authors: Luke Koch, Sean Oesch, Mary Adkisson, Sam Erwin, Brian Weber, Amul Chaulagain

    Abstract: Standardized file formats play a key role in the development and use of computer software. However, it is possible to abuse standardized file formats by creating a file that is valid in multiple file formats. The resulting polyglot (many languages) file can confound file format identification, allowing elements of the file to evade analysis.This is especially problematic for malware detection syst… ▽ More

    Submitted 12 April, 2022; v1 submitted 14 March, 2022; originally announced March 2022.

  10. arXiv:2112.10271  [pdf, other

    cs.CV

    Wiener Guided DIP for Unsupervised Blind Image Deconvolution

    Authors: Gustav Bredell, Ertunc Erdil, Bruno Weber, Ender Konukoglu

    Abstract: Blind deconvolution is an ill-posed problem arising in various fields ranging from microscopy to astronomy. The ill-posed nature of the problem requires adequate priors to arrive to a desirable solution. Recently, it has been shown that deep learning architectures can serve as an image generation prior during unsupervised blind deconvolution optimization, however often exhibiting a performance flu… ▽ More

    Submitted 19 December, 2021; originally announced December 2021.

  11. arXiv:2112.00100  [pdf, other

    cs.HC

    A Mathematical Framework for Evaluation of SOAR Tools with Limited Survey Data

    Authors: Savannah Norem, Ashley E Rice, Samantha Erwin, Robert A Bridges, Sean Oesch, Brian Weber

    Abstract: Security operation centers (SOCs) all over the world are tasked with reacting to cybersecurity alerts ranging in severity. Security Orchestration, Automation, and Response (SOAR) tools streamline cybersecurity alert responses by SOC operators. SOAR tool adoption is expensive both in effort and finances. Hence, it is crucial to limit adoption to those most worthwhile; yet no research evaluating or… ▽ More

    Submitted 30 November, 2021; originally announced December 2021.

  12. arXiv:2103.09577  [pdf, other

    cs.LG cs.CV stat.ML

    Theoretical bounds on data requirements for the ray-based classification

    Authors: Brian J. Weber, Sandesh S. Kalantre, Thomas McJunkin, Jacob M. Taylor, Justyna P. Zwolak

    Abstract: The problem of classifying high-dimensional shapes in real-world data grows in complexity as the dimension of the space increases. For the case of identifying convex shapes of different geometries, a new classification framework has recently been proposed in which the intersections of a set of one-dimensional representations, called rays, with the boundaries of the shape are used to identify the s… ▽ More

    Submitted 26 February, 2022; v1 submitted 17 March, 2021; originally announced March 2021.

    Comments: 10 pages, 5 figures

    MSC Class: 68T20; 68Q32; 68U10

    Journal ref: SN Comput. Sci. 3, 57 (2022)

  13. arXiv:2012.09214  [pdf, other

    cs.CR cs.LG

    Beyond the Hype: A Real-World Evaluation of the Impact and Cost of Machine Learning-Based Malware Detection

    Authors: Robert A. Bridges, Sean Oesch, Miki E. Verma, Michael D. Iannacone, Kelly M. T. Huffer, Brian Jewell, Jeff A. Nichols, Brian Weber, Justin M. Beaver, Jared M. Smith, Daniel Scofield, Craig Miles, Thomas Plummer, Mark Daniell, Anne M. Tall

    Abstract: In this paper, we present a scientific evaluation of four prominent malware detection tools to assist an organization with two primary questions: To what extent do ML-based tools accurately classify previously- and never-before-seen files? Is it worth purchasing a network-level malware detector? To identify weaknesses, we tested each tool against 3,536 total files (2,554 or 72\% malicious, 982 or… ▽ More

    Submitted 17 August, 2022; v1 submitted 16 December, 2020; originally announced December 2020.

    Comments: Includes Actionable Takeaways for SOCs

    Journal ref: Digital Threats: Research and Practice 2023

  14. arXiv:2010.00500  [pdf, other

    cs.LG cond-mat.mes-hall cs.CV quant-ph stat.ML

    Ray-based classification framework for high-dimensional data

    Authors: Justyna P. Zwolak, Sandesh S. Kalantre, Thomas McJunkin, Brian J. Weber, Jacob M. Taylor

    Abstract: While classification of arbitrary structures in high dimensions may require complete quantitative information, for simple geometrical structures, low-dimensional qualitative information about the boundaries defining the structures can suffice. Rather than using dense, multi-dimensional data, we propose a deep neural network (DNN) classification framework that utilizes a minimal collection of one-d… ▽ More

    Submitted 26 February, 2022; v1 submitted 1 October, 2020; originally announced October 2020.

    Journal ref: Proceedings of the Machine Learning and the Physical Sciences Workshop at NeurIPS 2020, Vancouver, Canada

  15. arXiv:1811.04794  [pdf, other

    cs.CR

    The SFS Summer Research Study at UMBC: Project-Based Learning Inspires Cybersecurity Students

    Authors: Alan Sherman, Enis Golaszewski, Edward LaFemina, Ethan Goldschen, Mohammed Khan, Lauren Mundy, Mykah Rather, Bryan Solis, Wubnyonga Tete, Edwin Valdez, Brian Weber, Damian Doyle, Casey O'Brien, Linda Oliva, Joseph Roundy, Jack Suess

    Abstract: May 30-June 2, 2017, Scholarship for Service (SFS) scholars at the University of Maryland, Baltimore County (UMBC) analyzed the security of a targeted aspect of the UMBC computer systems. During this hands-on study, with complete access to source code, students identified vulnerabilities, devised and implemented exploits, and suggested mitigations. As part of a pioneering program at UMBC to extend… ▽ More

    Submitted 12 November, 2018; originally announced November 2018.

    Comments: Full-length report with 18 pages, 4 figures

  16. arXiv:1803.09340  [pdf

    cs.CV

    DeepVesselNet: Vessel Segmentation, Centerline Prediction, and Bifurcation Detection in 3-D Angiographic Volumes

    Authors: Giles Tetteh, Velizar Efremov, Nils D. Forkert, Matthias Schneider, Jan Kirschke, Bruno Weber, Claus Zimmer, Marie Piraud, Bjoern H. Menze

    Abstract: We present DeepVesselNet, an architecture tailored to the challenges faced when extracting vessel networks or trees and corresponding features in 3-D angiographic volumes using deep learning. We discuss the problems of low execution speed and high memory requirements associated with full 3-D convolutional networks, high-class imbalance arising from the low percentage of vessel voxels, and unavaila… ▽ More

    Submitted 13 August, 2019; v1 submitted 25 March, 2018; originally announced March 2018.

    Comments: 13 pages

  17. The Internet-of-Things Meets Business Process Management: A Manifesto

    Authors: Christian Janiesch, Agnes Koschmider, Massimo Mecella, Barbara Weber, Andrea Burattin, Claudio Di Ciccio, Giancarlo Fortino, Avigdor Gal, Udo Kannengiesser, Francesco Leotta, Felix Mannhardt, Andrea Marrella, Jan Mendling, Andreas Oberweis, Manfred Reichert, Stefanie Rinderle-Ma, Estefania Serral, WenZhan Song, Jianwen Su, Victoria Torres, Matthias Weidlich, Mathias Weske, Liang Zhang

    Abstract: The Internet of Things (IoT) refers to a network of connected devices collecting and exchanging data over the Internet. These things can be artificial or natural, and interact as autonomous agents forming a complex system. In turn, Business Process Management (BPM) was established to analyze, discover, design, implement, execute, monitor and evolve collaborative business processes within and acros… ▽ More

    Submitted 28 October, 2020; v1 submitted 11 September, 2017; originally announced September 2017.

  18. arXiv:1706.01987  [pdf, other

    physics.chem-ph cs.CE

    ChemKED: a human- and machine-readable data standard for chemical kinetics experiments

    Authors: Bryan W. Weber, Kyle E. Niemeyer

    Abstract: Fundamental experimental measurements of quantities such as ignition delay times, laminar flame speeds, and species profiles (among others) serve important roles in understanding fuel chemistry and validating chemical kinetic models. However, despite both the importance and abundance of such information in the literature, the community lacks a widely adopted standard format for this data. This imp… ▽ More

    Submitted 15 November, 2017; v1 submitted 6 June, 2017; originally announced June 2017.

    Comments: 22 pages, accepted for publication in the International Journal of Chemical Kinetics

  19. arXiv:1704.03610  [pdf, other

    cs.SE

    Blockchains for Business Process Management - Challenges and Opportunities

    Authors: Jan Mendling, Ingo Weber, Wil van der Aalst, Jan vom Brocke, Cristina Cabanillas, Florian Daniel, Soren Debois, Claudio Di Ciccio, Marlon Dumas, Schahram Dustdar, Avigdor Gal, Luciano Garcia-Banuelos, Guido Governatori, Richard Hull, Marcello La Rosa, Henrik Leopold, Frank Leymann, Jan Recker, Manfred Reichert, Hajo A. Reijers, Stefanie Rinderle-Ma, Andreas Rogge-Solti, Michael Rosemann, Stefan Schulte, Munindar P. Singh , et al. (7 additional authors not shown)

    Abstract: Blockchain technology promises a sizable potential for executing inter-organizational business processes without requiring a central party serving as a single point of trust (and failure). This paper analyzes its impact on business process management (BPM). We structure the discussion using two BPM frameworks, namely the six BPM core capabilities and the BPM lifecycle. This paper provides research… ▽ More

    Submitted 31 January, 2018; v1 submitted 11 April, 2017; originally announced April 2017.

    Comments: Preprint for ACM TMIS

  20. arXiv:1703.09468  [pdf, other

    cs.HC

    Cheetah Experimental Platform Web 1.0: Cleaning Pupillary Data

    Authors: Stefan Zugal, Jakob Pinggera, Manuel Neurauter, Thomas Maran, Barbara Weber

    Abstract: Recently, researchers started using cognitive load in various settings, e.g., educational psychology, cognitive load theory, or human-computer interaction. Cognitive load characterizes a tasks' demand on the limited information processing capacity of the brain. The widespread adoption of eye-tracking devices led to increased attention for objectively measuring cognitive load via pupil dilation. Ho… ▽ More

    Submitted 21 April, 2018; v1 submitted 28 March, 2017; originally announced March 2017.

  21. arXiv:1608.02427  [pdf, other

    cs.NI

    Maximum-Likelihood Detection for Energy-Efficient Timing Acquisition in NB-IoT

    Authors: Harald Kroll, Matthias Korb, Benjamin Weber, Samuel Willi, Qiuting Huang

    Abstract: Initial timing acquisition in narrow-band IoT (NB-IoT) devices is done by detecting a periodically transmitted known sequence. The detection has to be done at lowest possible latency, because the RF-transceiver, which dominates downlink power consumption of an NB-IoT modem, has to be turned on throughout this time. Auto-correlation detectors show low computational complexity from a signal processi… ▽ More

    Submitted 23 November, 2016; v1 submitted 5 August, 2016; originally announced August 2016.

    Comments: 5 pages, 6 figures, submitted to M2M Communications and the Internet of Things workshop at WCNC 2017

  22. Detection and Quantification of Flow Consistency in Business Process Models

    Authors: Andrea Burattin, Vered Bernstein, Manuel Neurauter, Pnina Soffer, Barbara Weber

    Abstract: Business process models abstract complex business processes by representing them as graphical models. Their layout, solely determined by the modeler, affects their understandability. To support the construction of understandable models it would be beneficial to systematically study this effect. However, this requires a basic set of measurable key visual features, depicting the layout properties th… ▽ More

    Submitted 9 February, 2016; originally announced February 2016.

  23. Investigating the Process of Process Modeling with Eye Movement Analysis

    Authors: Jakob Pinggera, Marco Furtner, Markus Martini, Pierre Sachse, Katharina Reiter, Stefan Zugal, Barbara Weber

    Abstract: Research on quality issues of business process models has recently begun to explore the process of creating process models by analyzing the modeler's interactions with the modeling environment. In this paper we aim to complement previous insights on the modeler's modeling behavior with data gathered by tracking the modeler's eye movements when engaged in the act of modeling. We present preliminary… ▽ More

    Submitted 11 November, 2015; originally announced November 2015.

    Comments: arXiv admin note: text overlap with arXiv:1511.04057

    Journal ref: Proc. ER-BPM'12, pp. 438-450, 2013

  24. Change Patterns for Model Creation: Investigating the Role of Nesting Depth

    Authors: Barbara Weber, Jakob Pinggera, Victoria Torres, Manfred Reichert

    Abstract: Process model quality has been an area of considerable research efforts. In this context, the correctness-by-construction principle of change patterns offers a promising perspective. However, using change patterns for model creation imposes a more structured way of modeling. While the process of process modeling (PPM) based on change primitives has been investigated, little is known about this pro… ▽ More

    Submitted 11 November, 2015; originally announced November 2015.

    Comments: arXiv admin note: substantial text overlap with arXiv:1511.04059

    Journal ref: Proc. Cognise'13, pp. 198-204, 2013

  25. How Advanced Change Patterns Impact the Process of Process Modeling

    Authors: Barbara Weber, Sarah Zeitelhofer, Jakob Pinggera, Victoria Torres, Manfred Reichert

    Abstract: Process model quality has been an area of considerable research efforts. In this context, correctness-by-construction as enabled by change patterns provides promising perspectives. While the process of process modeling (PPM) based on change primitives has been thoroughly investigated, only little is known about the PPM based on change patterns. In particular, it is unclear what set of change patte… ▽ More

    Submitted 11 November, 2015; originally announced November 2015.

    Journal ref: Proc. BPMDS'14, pp. 17-32, 2014

  26. Change Patterns in Use: A Critical Evaluation

    Authors: Barbara Weber, Jakob Pinggera, Victoria Torres, Manfred Reichert

    Abstract: Process model quality has been an area of considerable research efforts. In this context, the correctness-by-construction principle of change patterns provides promising perspectives. However, using change patterns for model creation imposes a more structured way of modeling. While the process of process modeling (PPM) based on change primitives has been investigated, little is known about this pr… ▽ More

    Submitted 11 November, 2015; originally announced November 2015.

    Journal ref: Proc. BPMDS'13, pp. 261-276, 2013

  27. Expressiveness and Understandability Considerations of Hierarchy in Declarative Business Process Models

    Authors: Stefan Zugal, Pnina Soffer, Jakob Pinggera, Barbara Weber

    Abstract: Hierarchy has widely been recognized as a viable approach to deal with the complexity of conceptual models. For instance, in declarative business process models, hierarchy is realized by sub-processes. While technical implementations of declarative sub-processes exist, their application, semantics, and the resulting impact on understandability are less understood yet-this research gap is addressed… ▽ More

    Submitted 11 November, 2015; originally announced November 2015.

    Journal ref: Proc. BPMDS'12, pp. 167-181, 2012

  28. Modeling Styles in Business Process Modeling

    Authors: Jakob Pinggera, Pnina Soffer, Stefan Zugal, Barbara Weber, Matthias Weidlich, Dirk Fahland, Hajo A. Reijers, Jan Mendling

    Abstract: Research on quality issues of business process models has recently begun to explore the process of creating process models. As a consequence, the question arises whether different ways of creating process models exist. In this vein, we observed 115 students engaged in the act of modeling, recording all their interactions with the modeling environment using a specialized tool. The recordings of pro… ▽ More

    Submitted 11 November, 2015; originally announced November 2015.

    Journal ref: Proc. BPMDS'12, pp. 151-166, 2012

  29. A visual analysis of the process of process modeling

    Authors: Jan Claes, Irene Vanderfeesten, Jakob Pinggera, Hajo A. Reijers, Barbara Weber, Geert Poels

    Abstract: The construction of business process models has become an important requisite in the analysis and optimization of processes. The success of the analysis and optimization efforts heavily depends on the quality of the models. Therefore, a research domain emerged that studies the process of process modeling. This paper contributes to this research by presenting a way of visualizing the different step… ▽ More

    Submitted 11 November, 2015; originally announced November 2015.

  30. Visualizing the Process of Process Modeling with PPMCharts

    Authors: Jan Claes, Irene Vanderfeesten, Jakob Pinggera, Hajo A. Reijers, Barbara Weber, Geert Poels

    Abstract: In the quest for knowledge about how to make good process models, recent research focus is shifting from studying the quality of process models to studying the process of process modeling (often abbreviated as PPM) itself. This paper reports on our efforts to visualize this specific process in such a way that relevant characteristics of the modeling process can be observed graphically. By recordin… ▽ More

    Submitted 11 November, 2015; originally announced November 2015.

    Journal ref: Proc. TAProViz'12, pp. 744-755, 2013

  31. Tying Process Model Quality to the Modeling Process: The Impact of Structuring, Movement, and Speed

    Authors: Jan Claes, Irene Vanderfeesten, Hajo A. Reijers, Jakob Pinggera, Matthias Weidlich, Stefan Zugal, Dirk Fahland, Barbara Weber, Jan Mendling, Geert Poels

    Abstract: In an investigation into the process of process modeling, we examined how modeling behavior relates to the quality of the process model that emerges from that. Specifically, we considered whether (i) a modeler's structured modeling style, (ii) the frequency of moving existing objects over the modeling canvas, and (iii) the overall modeling speed is in any way connected to the ease with which the r… ▽ More

    Submitted 11 November, 2015; originally announced November 2015.

  32. Making Sense of Declarative Process Models: Common Strategies and Typical Pitfalls

    Authors: Cornelia Haisjackl, Stefan Zugal, Pnina Soffer, Irit Hadar, Manfred Reichert, Jakob Pinggera, Barbara Weber

    Abstract: Declarative approaches to process modeling are regarded as well suited for highly volatile environments as they provide a high degree of flexibility. However, problems in understanding and maintaining declarative business process models impede often their usage. In particular, how declarative models are understood has not been investigated yet. This paper takes a first step toward addressing this… ▽ More

    Submitted 11 November, 2015; originally announced November 2015.

    Journal ref: Proc. BPMDS'13, pp. 2-17, 2013

  33. arXiv:0711.4634  [pdf

    cs.CY

    Strategies for Addressing Spreadsheet Compliance Challenges

    Authors: Brandon Weber

    Abstract: Most organizations today use spreadsheets in some form or another to support critical business processes. However the financial resources, and developmental rigor dedicated to them are often minor in comparison to other enterprise technology. The increasing focus on achieving regulatory and other forms of compliance over key technology assets has made it clear that organizations must regard spre… ▽ More

    Submitted 28 November, 2007; originally announced November 2007.

    Comments: 16 pages including web links and references

    Journal ref: Proc. European Spreadsheet Risks Int. Grp. 2006 17-32 ISBN:1-905617-08-09