Sciweavers

533 search results - page 64 / 107
» Control flow based obfuscation
Sort
View
151
Voted
TMC
2008
192views more  TMC 2008»
15 years 2 months ago
A Bidding Algorithm for Optimized Utility-Based Resource Allocation in Ad Hoc Networks
Abstract-- This article proposes a scheme for bandwidth allocation in wireless ad hoc networks. The quality of service (QoS) levels for each end-to-end flow are expressed using a r...
Calin Curescu, Simin Nadjm-Tehrani
BPM
2008
Springer
136views Business» more  BPM 2008»
15 years 4 months ago
From Paper Based Clinical Practice Guidelines to Declarative Workflow Management
We present a field study of oncology workflow, involving doctors, nurses and pharmacists at Danish hospitals and discuss the obstacles, enablers and challenges for the use of compu...
Karen Marie Lyng, Thomas Hildebrandt, Raghava Rao ...
117
Voted
COOPIS
2004
IEEE
15 years 6 months ago
Discovering Workflow Transactional Behavior from Event-Based Log
Previous workflow mining works have concentrated their efforts on process behavioral aspects. Although powerful, these proposals are found lacking in functionalities and performanc...
Walid Gaaloul, Sami Bhiri, Claude Godart
118
Voted
FPGA
2006
ACM
98views FPGA» more  FPGA 2006»
15 years 6 months ago
A reconfigurable hardware based embedded scheduler for buffered crossbar switches
In this paper, we propose a new internally buffered crossbar (IBC) switching architecture where the input and output distributed schedulers are embedded inside the crossbar fabric...
Lotfi Mhamdi, Christopher Kachris, Stamatis Vassil...
141
Voted
EKNOW
2009
15 years 11 days ago
Process Diagnostics: A Method Based on Process Mining
As organizations change, their information systems can evolve from simple systems to complex systems, which are hard to understand, and therefore hard to maintain or extend. Proces...
Melike Bozkaya, Joost Gabriels, Jan Martijn E. M. ...