Sciweavers

521 search results - page 31 / 105
» Discovering Models of Software Processes from Event-Based Da...
Sort
View
B
2007
Springer
13 years 11 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
BPM
2009
Springer
175views Business» more  BPM 2009»
14 years 2 months ago
Understanding Spaghetti Models with Sequence Clustering for ProM
The goal of process mining is to discover process models from event logs. However, for processes that are not well structured and have a lot of diverse behavior, existing process m...
Gabriel M. Veiga, Diogo R. Ferreira
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 7 months ago
Algorithmic Verification of Single-Pass List Processing Programs
We introduce streaming data string transducers that map input data strings to output data strings in a single left-to-right pass in linear time. Data strings are (unbounded) seque...
Rajeev Alur, Pavol Cerný
SCM
1998
13 years 9 months ago
Change Measurements in an SCM Process
Abstract. An SCM database contains data which can be used as input for Software Metrics. Both data for Size-Oriented Metrics, and information for ProcessOriented Metrics are availa...
Ivica Crnkovic, Per Willför
ICOODB
2010
171views Database» more  ICOODB 2010»
13 years 5 months ago
Data Model Driven Implementation of Web Cooperation Systems with Tricia
Abstract. We present the data modeling concepts of Tricia, an opensource Java platform used to implement enterprise web information systems as well as social software solutions inc...
Thomas Büchner, Florian Matthes, Christian Ne...