Sciweavers

945 search results - page 42 / 189
» Detective Information Flow Analysis for Business Processes
Sort
View
CCR
2004
87views more  CCR 2004»
13 years 7 months ago
Non-stationarity and high-order scaling in TCP flow arrivals: a methodological analysis
The last decade has been a very fruitful period in important discoveries in network traffic modeling, uncovering various scaling behaviors. Self-similarity, long-range dependence,...
Steve Uhlig
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
14 years 27 days ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
ACMICEC
2005
ACM
157views ECommerce» more  ACMICEC 2005»
13 years 9 months ago
The development and evaluation of exception handling mechanisms for order fulfillment process based on BPEL4WS
The advance of Internet technology fosters the order fulfillment process in a supply chain across heterogeneous information systems. In order to monitor states between partners in...
Fu-ren Lin, Hsiang-chin Chang
DAWAK
2008
Springer
13 years 9 months ago
UML-Based Modeling for What-If Analysis
In order to be able to evaluate beforehand the impact of a strategical or tactical move, decision makers need reliable previsional systems. What-if analysis satisfies this need by ...
Matteo Golfarelli, Stefano Rizzi
DSOM
2006
Springer
13 years 11 months ago
Detecting Bottleneck in n-Tier IT Applications Through Analysis
As the complexity of large-scale enterprise applications increases, providing performance verification through staging becomes an important part of reducing business risks associat...
Gueyoung Jung, Galen S. Swint, Jason Parekh, Calto...