Sciweavers

109 search results - page 18 / 22
» A BPMN Extension for the Modeling of Security Requirements i...
Sort
View
ECIS
2000
13 years 9 months ago
Leveraging Professional Intellect in the Virtual Age
The paper explores the nature of professional intellect and the requirements for managing it, an area acknowledged as being under-researched. Five case studies in the professional ...
Dieter Fink
IEEEARES
2007
IEEE
14 years 1 months ago
Models for automatic generation of safety-critical real-time systems
Model-based development has become state of the art in software engineering. A number of tools, like Matlab/Simulink or SCADE, are available for the automatic generation of applic...
Christian Buckl, Matthias Regensburger, Alois Knol...
AAAI
2012
11 years 10 months ago
POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing
Penetration Testing is a methodology for assessing network security, by generating and executing possible hacking attacks. Doing so automatically allows for regular and systematic...
Carlos Sarraute, Olivier Buffet, Jörg Hoffman...
HICSS
2003
IEEE
154views Biometrics» more  HICSS 2003»
14 years 25 days ago
Data-driven Methodology to Extending Workflows to E-services over the Internet
E-services refer to the services offered over the Internet. The globalization of economy accelerates the provision of e-services across organizations. Instead of being built from ...
Shing-Chi Cheung, Dickson K. W. Chiu, Sven Till
DGO
2009
175views Education» more  DGO 2009»
13 years 8 months ago
Modelling task delegation for human-centric eGovernment workflows
The execution of cross-domain eGovernment applications is a challenging topic. eGovernment organisations are facilitated and conducted using workflow management systems. Workflows...
Khaled Gaaloul, François Charoy, Andreas Sc...