Sciweavers

134 search results - page 19 / 27
» Detecting Clones in Business Applications
Sort
View
SDM
2012
SIAM
247views Data Mining» more  SDM 2012»
12 years 7 days ago
Simplex Distributions for Embedding Data Matrices over Time
Early stress recognition is of great relevance in precision plant protection. Pre-symptomatic water stress detection is of particular interest, ultimately helping to meet the chal...
Kristian Kersting, Mirwaes Wahabzada, Christoph R&...
GI
2009
Springer
13 years 7 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
SIGMOD
2005
ACM
100views Database» more  SIGMOD 2005»
14 years 10 months ago
Events on the edge
The emergence of large-scale receptor-based systems has enabled applications to execute complex business logic over data generated from monitoring the physical world. An important...
Shariq Rizvi, Shawn R. Jeffery, Sailesh Krishnamur...
BPM
2004
Springer
95views Business» more  BPM 2004»
14 years 1 months ago
On Dealing with Structural Conflicts between Process Type and Instance Changes
Abstract. Adaptive process management systems must be able to support changes of single process instances as well as modifications at the process type level and their propagation t...
Stefanie Rinderle, Manfred Reichert, Peter Dadam
BPM
2006
Springer
128views Business» more  BPM 2006»
13 years 11 months ago
Towards Formal Verification of Web Service Composition
Abstract. Web services composition is an emerging paradigm for enabling application integration within and across organizational boundaries. Current Web services composition propos...
Mohsen Rouached, Olivier Perrin, Claude Godart