Sciweavers

7179 search results - page 1298 / 1436
» Design for Product Adaptability
Sort
View
NSDI
2008
13 years 10 months ago
iPhish: Phishing Vulnerabilities on Consumer Electronics
As consumer electronic devices with embedded browsers become popular, financial institutions and online merchants set up websites to accommodate visitors using these devices. Thes...
Yuan Niu, Francis Hsu, Hao Chen
ARGMAS
2008
Springer
13 years 10 months ago
Annotation and Matching of First-Class Agent Interaction Protocols
Many practitioners view agent interaction protocols as rigid specifications that are defined a priori, and hard-code their agents with a set of protocols known at design time -- a...
Tim Miller, Peter McBurney
AUTONOMICS
2008
ACM
13 years 10 months ago
Autonomic management via dynamic combinations of reusable strategies
Autonomic Management capabilities become increasingly important for attaining functional and quality goals in software systems. Nonetheless, successful Autonomic Management soluti...
Ada Diaconescu, Yoann Maurel, Philippe Lalanda
BPM
2008
Springer
207views Business» more  BPM 2008»
13 years 10 months ago
From Personal Task Management to End-User Driven Business Process Modeling
The need to involve business users in process modeling is largely perceived in the context of Business Process Management systems. This can facilitate the elaboration of consistent...
Todor Stoitsev, Stefan Scheidl, Felix Flentge, Max...
BPM
2008
Springer
138views Business» more  BPM 2008»
13 years 10 months ago
Issues in Modeling Process Variants with Provop
For a particular business process, typically, different variants exist. Each of them constitutes an adjustment of a basic process (e.g. a reference process) to specific requirement...
Alena Hallerbach, Thomas Bauer, Manfred Reichert
« Prev « First page 1298 / 1436 Last » Next »