Sciweavers

173 search results - page 18 / 35
» Modelling Quality of Protection in Outsourced Business Proce...
Sort
View
INFOCOM
2009
IEEE
14 years 3 months ago
Protecting Against Network Infections: A Game Theoretic Perspective
— Security breaches and attacks are critical problems in today’s networking. A key-point is that the security of each host depends not only on the protection strategies it choo...
Jasmina Omic, Ariel Orda, Piet Van Mieghem
EWCBR
2006
Springer
14 years 4 days ago
Case-Base Maintenance for CCBR-Based Process Evolution
The success of a company more and more depends on its ability to flexibly and quickly react to changes. Combining process management techniques and conversational case-based reason...
Barbara Weber, Manfred Reichert, Werner Wild
ICASSP
2011
IEEE
13 years 6 days ago
Semantic data selection for vertical business voice search
Local business voice search is a popular application for mobile phones, where hands-free interaction and speed are critical to users. However, speech recognition accuracy is still...
Giuseppe Di Fabbrizio, Diamantino Caseiro, Amanda ...
OTM
2007
Springer
14 years 2 months ago
Understanding the Occurrence of Errors in Process Models Based on Metrics
Abstract. Business process models play an important role for the management, design, and improvement of process organizations and processaware information systems. Despite the exte...
Jan Mendling, Gustaf Neumann, Wil M. P. van der Aa...
BPM
2004
Springer
108views Business» more  BPM 2004»
14 years 1 months ago
SMART: System Model Acquisition from Requirements Text
Modeling of a business system has traditionally been based on free text documents. This work describes an elaborate experiment that constitutes a proof of concept to the idea that ...
Dov Dori, Nahum Korda, Avi Soffer, Shalom Cohen