Sciweavers

2940 search results - page 54 / 588
» Behavioral Constraints for Services
Sort
View
ICC
2009
IEEE
150views Communications» more  ICC 2009»
14 years 5 months ago
Modeling Human Behavior for Defense Against Flash-Crowd Attacks
—Flash-crowd attacks are the most vicious form of distributed denial of service (DDoS). They flood the victim with service requests generated from numerous bots. Attack requests...
Georgios Oikonomou, Jelena Mirkovic
BPM
2009
Springer
169views Business» more  BPM 2009»
14 years 4 months ago
Analyzing Resource Behavior Using Process Mining
It is vital to use accurate models for the analysis, design, and/or control of business processes. Unfortunately, there are often important discrepancies between reality and models...
Joyce Nakatumba, Wil M. P. van der Aalst
BPM
2006
Springer
113views Business» more  BPM 2006»
14 years 2 months ago
Process Equivalence: Comparing Two Process Models Based on Observed Behavior
In various application domains there is a desire to compare process models, e.g., to relate an organization-specific process model to a reference model, to find a web service match...
Wil M. P. van der Aalst, Ana Karla A. de Medeiros,...
DKE
2008
88views more  DKE 2008»
13 years 10 months ago
Quantifying process equivalence based on observed behavior
In various application domains there is a desire to compare process models, e.g., to relate an organization-specific process model to a reference model, to find a web service matc...
Ana Karla Alves de Medeiros, Wil M. P. van der Aal...
ICYCS
2008
IEEE
14 years 4 months ago
A Trust-Enabling Support for Goal-Based Services
Service-Oriented Computing allows new applications to be developed by using and/or combining services offered by different providers. In several cases a service needs sensitive in...
Luiz Olavo Bonino da Silva Santos, Luís Fer...