Sciweavers

2653 search results - page 473 / 531
» Business process reengineering
Sort
View
SACMAT
2010
ACM
14 years 23 days ago
Monitoring security policies with metric first-order temporal logic
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
David A. Basin, Felix Klaedtke, Samuel Müller
ESWS
2010
Springer
14 years 23 days ago
Interactive Relationship Discovery via the Semantic Web
This paper presents an approach for the interactive discovery of relationships between selected elements via the Semantic Web. It emphasizes the human aspect of relationship discov...
Philipp Heim, Steffen Lohmann, Timo Stegemann
ICADL
2010
Springer
160views Education» more  ICADL 2010»
14 years 23 days ago
Thesaurus Extension Using Web Search Engines
Maintaining and extending large thesauri is an important challenge facing digital libraries and IT businesses alike. In this paper we describe a method building on and extending ex...
Robert Meusel, Mathias Niepert, Kai Eckert, Heiner...
ICCCI
2009
Springer
14 years 17 days ago
A Multi-agent Model of Deceit and Trust in Intercultural Trade
Trust is a sine qua non for trade. According to transaction cost economics, a contract always offers some opportunity to defect. In the case of asymmetric product information, wher...
Gert Jan Hofstede, Catholijn M. Jonker, Tim Verwaa...
KES
2009
Springer
14 years 16 days ago
An Ontology-Based Autonomic System for Improving Data Warehouse Performances
: With the increase in the amount and complexity of information, data warehouse performance has become a constant issue, especially for decision support systems. As decisional expe...
Vlad Nicolicin-Georgescu, Vincent Benatier, R&eacu...