Sciweavers

2714 search results - page 374 / 543
» A Service-Oriented Approach for Model Management
Sort
View
111
Voted
KBSE
2007
IEEE
15 years 10 months ago
Adaptation hiding modularity
Growth in the complexity of computing systems, in the dynamism of the environments they operate in, and the need for timely adaptations as conditions change, now pose significant...
Yuanyuan Song
138
Voted
ADC
2006
Springer
135views Database» more  ADC 2006»
15 years 9 months ago
Using a temporal constraint network for business process execution
Business process management (BPM) has emerged as a dominant technology in current enterprise systems and business solutions. However, the technology continues to face challenges i...
Ruopeng Lu, Shazia Wasim Sadiq, Vineet Padmanabhan...
143
Voted
CAISE
2004
Springer
15 years 7 months ago
Enhancing Application Interoperability and Enabling B2B Transactions over the Internet for Small and Medium Enterprises: The PRA
Abstract. The paper presents an approach towards executing transactions between enterprises, governmental bodies and banking institutions, based on ERP applications connected over ...
Yannis Charalabidis, Stelios Pantelopoulos
134
Voted
CLEF
2006
Springer
15 years 7 months ago
Dublin City University at CLEF 2006: Cross-Language Speech Retrieval (CL-SR) Experiments
The Dublin City University participation in the CLEF 2006 CL-SR task concentrated on exploring the combination of the multiple fields associated with the documents. This was based...
Gareth J. F. Jones, Ke Zhang, Adenike M. Lam-Adesi...
113
Voted
WWW
2008
ACM
16 years 4 months ago
Rogue access point detection using segmental TCP jitter
Rogue Access Points (RAPs) pose serious security threats to local networks. An analytic model of prior probability distribution of Segmental TCP Jitter (STJ) is deduced from the m...
Gaogang Xie, Tingting He, Guangxing Zhang