Sciweavers

3451 search results - page 529 / 691
» Collaborative attack modeling
Sort
View
ISEMANTICS
2010
13 years 7 months ago
Towards an approach for formalizing the supply chain operations
Reference models play an important role in the knowledge management of the various complex collaboration domains (such as Supply Chain Networks). However, they often show a lack o...
Milan Zdravkovic, Hervé Panetto, Miroslav T...
GI
2010
Springer
13 years 7 months ago
Reusable Interaction Protocols for Workflows
With the advent of collaborative business processes that may include different parties, the interaction means between those processes steadily gains more importance. Despite this i...
Alexander Pokahr, Lars Braubach
PERCOM
2011
ACM
13 years 4 months ago
AnonySense: A system for anonymous opportunistic sensing
We describe AnonySense, a privacy-aware system for realizing pervasive applications based on collaborative, opportunistic sensing by personal mobile devices. AnonySense allows app...
Minho Shin, Cory Cornelius, Daniel Peebles, Apu Ka...
ACCV
2010
Springer
13 years 4 months ago
Learning Rare Behaviours
Abstract. We present a novel approach to detect and classify rare behaviours which are visually subtle and occur sparsely in the presence of overwhelming typical behaviours. We tre...
Jian Li, Timothy M. Hospedales, Shaogang Gong, Tao...
ICDT
2011
ACM
270views Database» more  ICDT 2011»
13 years 21 days ago
On the equivalence of distributed systems with queries and communication
Distributed data management systems consist of peers that store, exchange and process data in order to collaboratively achieve a common goal, such as evaluate some query. We study...
Serge Abiteboul, Balder ten Cate, Yannis Katsis