Sciweavers

772 search results - page 75 / 155
» Creating and analysing models in IBM Task Modeler
Sort
View
141
Voted
BPM
2008
Springer
217views Business» more  BPM 2008»
15 years 5 months ago
Detecting Regulatory Compliance for Business Process Models through Semantic Annotations
A given business process may face a large number of regulatory obligations the process may or comply with. Providing tools and techniques through which an evaluation of the complia...
Guido Governatori, Jörg Hoffmann, Shazia Wasi...
152
Voted
ICEIS
2008
IEEE
15 years 10 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
102
Voted
CIBCB
2007
IEEE
15 years 10 months ago
Spectral Decomposition of Signaling Networks
—Many dynamical processes can be represented as directed attributed graphs or Petri nets where relationships between various entities are explicitly expressed. Signaling networks...
Bahram Parvin, Nirmalya Ghosh, Laura Heiser, Merri...
142
Voted
CIKM
2009
Springer
15 years 8 months ago
An empirical study on using hidden markov model for search interface segmentation
This paper describes a hidden Markov model (HMM) based approach to perform search interface segmentation. Automatic processing of an interface is a must to access the invisible co...
Ritu Khare, Yuan An
141
Voted
SPE
2002
105views more  SPE 2002»
15 years 3 months ago
Specifying a role-based guide for learning to work with an enterprise framework
Learning to work with enterprise frameworks requires considerable effort, because of the inherent complexity of all the knowledge that is needed. However, different roles in proje...
Wilhelm Hasselbring, Ralph van den Houdt