Sciweavers

1534 search results - page 228 / 307
» A Business Process Explorer: Recovering Business Processes f...
Sort
View
SACMAT
2010
ACM
14 years 16 days ago
Monitoring security policies with metric first-order temporal logic
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
David A. Basin, Felix Klaedtke, Samuel Müller
OHS
2001
Springer
14 years 4 days ago
Integrating User Data and Collaborative Filtering in a Web Recommendation System
Web-based applications with a large variety of users suffer from the inability to satisfy heterogeneous needs. A remedy for the negative effects of the traditional "one-size-...
Paolo Buono, Maria Francesca Costabile, Stefano Gu...
ECUMN
2004
Springer
13 years 11 months ago
A Flow-Through Workflow Control Scheme for BGP/MPLS VPN Service Provision
In a competitive telecommunications marketplace, operators must provide customers with rapid access to both new and traditional service offerings. Market share is developed through...
Daniel Won-Kyu Hong, Choong Seon Hong
ASWEC
2007
IEEE
14 years 2 months ago
Dynamic Protocol Aggregation and Adaptation for Service-Oriented Computing
Service Oriented Computing (SOC) is a paradigm for building new software applications from existing loosely-coupled services. During service composition, services available to pla...
Linh Duy Pham, Alan W. Colman, Jean-Guy Schneider
LREC
2010
132views Education» more  LREC 2010»
13 years 9 months ago
Hungarian Dependency Treebank
Herein, we present the process of developing the first Hungarian Dependency TreeBank. First, short references are made to dependency grammars we considered important in the develo...
Veronika Vincze, Dóra Szauter, Attila Alm&a...