Sciweavers

3451 search results - page 562 / 691
» Collaborative attack modeling
Sort
View
ICFEM
2005
Springer
14 years 2 months ago
A Compositional Framework for Service Interaction Patterns and Interaction Flows
We provide precise high-level models for eight fundamental service interaction patterns, together with schemes for their composition into complex service-based business process int...
Alistair P. Barros, Egon Börger
HICSS
2003
IEEE
100views Biometrics» more  HICSS 2003»
14 years 2 months ago
Increase of Potential Intellectual Bandwidth in a Scientific Community through Implementation of an End-User Information System
Qureshi, et al. (2002) [1] presented a case study where they used a framework, the Intellectual Bandwidth Model to measure an organization’s ability to create value. The model c...
Christian Bach, Salvatore Belardo, Jing Zhang
ICARCV
2002
IEEE
149views Robotics» more  ICARCV 2002»
14 years 2 months ago
A fast method to simulate virtual deformable objects with force feedback
In this paper, we propose solutions to real time simulation and interaction of deformable objects in virtual reality. Firstly, we present LEM - Long Element Method, a method creat...
Kenneth Sundaraj, César Mendoza, Christian ...
JCST
2008
124views more  JCST 2008»
13 years 9 months ago
Clustering by Pattern Similarity
The task of clustering is to identify classes of similar objects among a set of objects. The definition of similarity varies from one clustering model to another. However, in most ...
Haixun Wang, Jian Pei
WWW
2002
ACM
14 years 9 months ago
Clustering for opportunistic communication
We describe ongoing work on I2I, a system aimed at fostering opportunistic communication among users viewing or manipulating content on the Web and in productivity applications. U...
Jay Budzik, Shannon Bradshaw, Xiaobin Fu, Kristian...