Sciweavers

414 search results - page 79 / 83
» Application of Business Process Modeling at Timberland
Sort
View
SP
2007
IEEE
108views Security Privacy» more  SP 2007»
14 years 1 months ago
Trojan Detection using IC Fingerprinting
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower costs. This poses a significant security risk for ICs used for critical m...
Dakshi Agrawal, Selçuk Baktir, Deniz Karako...
ECHT
1992
13 years 11 months ago
Two Years before the Mist: Experiences with Aquanet
Aquanet is a collaborative hypertext tool that combines elements of frame-based knowledge representation and graphical presentation. In this paper, we examine the first major appl...
Catherine C. Marshall, Russell A. Rogers
FM
2006
Springer
126views Formal Methods» more  FM 2006»
13 years 11 months ago
Towards Modularized Verification of Distributed Time-Triggered Systems
Abstract. The correctness of a system according to a given specification is essential, especially for safety-critical applications. One such typical application domain is the autom...
Jewgenij Botaschanjan, Alexander Gruler, Alexander...
ECOWS
2007
Springer
13 years 11 months ago
A Dynamic Reconfigurable Web Service Composition Framework Using Reo Coordination Language
Web services are self-contained, modular units of application logic which provide business functionality to other applications via Internet connections. Several models have been u...
Soheil Saifipoor, Behrouz Tork Ladani, Naser Nemat...
ECIS
2004
13 years 8 months ago
From asp to web services: identifying key performance areas and indicators for healthcare
Value creation from e-business for customers in healthcare is an important topic in academic and practitioner circles. This paper reports the findings from a two-year research stu...
Matthew W. Guah, Wendy L. Currie