Sciweavers

502 search results - page 57 / 101
» Analyzing Interacting BPEL Processes
Sort
View
JCIT
2010
150views more  JCIT 2010»
13 years 3 months ago
Characteristic Description of Coupled Task Sets Based on Design Structure Matrix and Its Optimal Time and Efforts Solution by Ge
The complicated interactions among tasks lead to iterations in product design and development. To maintain the market share, enterprises should effectively manage their product de...
Ting-gui Chen, Chun-hua Ju
APSCC
2008
IEEE
14 years 3 months ago
A Service-Oriented Framework for Quantitative Security Analysis of Software Architectures
Software systems today often run in malicious environments in which attacks or intrusions are quite common. This situation has brought security concerns into the development of so...
Yanguo Liu, Issa Traoré, Alexander M. Hoole
ICCCN
2008
IEEE
14 years 3 months ago
A Trust Model Robust to Slander Attacks in Ad Hoc Networks
— Slander attacks represent a significant danger to distributed reputation systems. Malicious nodes may collude to lie about the reputation of a particular neighbor and cause se...
Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Mu...
HUC
2007
Springer
14 years 2 months ago
A Statistical Reasoning System for Medication Prompting
We describe our experience building and using a reasoning system for providing context-based prompts to elders to take their medication. We describe the process of specification, ...
Sengul Vurgun, Matthai Philipose, Misha Pavel
USS
2008
13 years 11 months ago
Multi-flow Attacks Against Network Flow Watermarking Schemes
We analyze several recent schemes for watermarking network flows based on splitting the flow into intervals. We show that this approach creates time dependent correlations that en...
Negar Kiyavash, Amir Houmansadr, Nikita Borisov