Sciweavers

236 search results - page 36 / 48
» Analysis of multi-agent activity using petri nets
Sort
View
WORDS
2005
IEEE
14 years 1 months ago
A Role-Based Access Control Policy Verification Framework for Real-Time Systems
This paper presents a framework for verifying the access control requirements of real-time application systems such as workflow management systems and active databases. The tempor...
Basit Shafiq, Ammar Masood, James Joshi, Arif Ghaf...
ESANN
2003
13 years 9 months ago
Approximation of Function by Adaptively Growing Radial Basis Function Neural Networks
In this paper a neural network for approximating function is described. The activation functions of the hidden nodes are the Radial Basis Functions (RBF) whose parameters are learn...
Jianyu Li, Siwei Luo, Yingjian Qi
APN
2005
Springer
14 years 1 months ago
Genetic Process Mining
The topic of process mining has attracted the attention of both researchers and tool vendors in the Business Process Management (BPM) space. The goal of process mining is to discov...
Wil M. P. van der Aalst, Ana Karla A. de Medeiros,...
SACMAT
2003
ACM
14 years 29 days ago
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
Horst Wedde, Mario Lischka
ECBS
2006
IEEE
143views Hardware» more  ECBS 2006»
14 years 1 months ago
Requirements Engineering for the Adviser Portal Bank System
The Adviser Portal (AP) is a new IT system for 15 Danish banks. The main goal of AP is to increase the efficiency and quality of bank advisers’ work. Requirements engineering fo...
Jens Bæk Jørgensen, Kristian Bisgaard...