Sciweavers

51 search results - page 4 / 11
» Inferring Declarative Requirements Specifications from Opera...
Sort
View
ACSAC
2004
IEEE
13 years 10 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
ECOWS
2009
Springer
13 years 10 months ago
An Analysis of Windows Workflow's Control-Flow Expressiveness
The Windows Workflow Foundation (WF) has been introduced as part of the .NET framework as a means of creating workflow-centric applications. Its intended field of application is br...
Marco Zapletal, Wil M. P. van der Aalst, Nick Russ...
EDOC
2000
IEEE
13 years 11 months ago
Ponder: Realising Enterprise Viewpoint Concepts
This paper introduces the Ponder language for specifying distributed object enterprise concepts. Ponder, is a declarative language, which permits the specification of policies in ...
Emil Lupu, Morris Sloman, Naranker Dulay, Nicodemo...
ATAL
2007
Springer
13 years 11 months ago
Workflow coordination for service-oriented multiagent systems
From a multiagent viewpoint, a workflow is a dynamic set of tasks performed by a set of agents to reach a shared goal. We show herein that commitments among agents can be used to ...
Jiangbo Dang, Jingshan Huang, Michael N. Huhns
EENERGY
2010
13 years 10 months ago
Statistical static capacity management in virtualized data centers supporting fine grained QoS specification
From an ecological but also from an economical and in the meantime a technical view the fast ongoing increase of power consumption in today’s data centers is no longer feasible....
Marko Hoyer, Kiril Schröder, Wolfgang Nebel