Sciweavers

2270 search results - page 112 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
BIS
2008
119views Business» more  BIS 2008»
13 years 10 months ago
Influence Factors of Understanding Business Process Models
The increasing utilization of business process models both in business analysis and information systems development raises several issues regarding quality measures. In this contex...
Jan Mendling, Mark Strembeck
ISD
1999
Springer
149views Database» more  ISD 1999»
14 years 1 months ago
Cost-Effective Determination of Biomass from Aerial Images
This paper describes an ongoing collaborative research program between the Computer Science and the Forestry and Wildlife Management Departments at the University of Massachusetts...
Howard J. Schultz, Dana Slaymaker, Chris Holmes, F...
ANOR
2006
174views more  ANOR 2006»
13 years 9 months ago
Evaluation of choice set generation algorithms for route choice models
This paper discusses choice set generation and route choice model estimation for large-scale urban networks. Evaluating the effectiveness of Advanced Traveler Information Systems (...
Shlomo Bekhor, Moshe E. Ben-Akiva, M. Scott Rammin...
APSCC
2008
IEEE
14 years 3 months ago
A Service-Oriented Framework for Quantitative Security Analysis of Software Architectures
Software systems today often run in malicious environments in which attacks or intrusions are quite common. This situation has brought security concerns into the development of so...
Yanguo Liu, Issa Traoré, Alexander M. Hoole
AH
2004
Springer
14 years 2 months ago
Recent Soft Computing Approaches to User Modeling in Adaptive Hypermedia
Abstract. The ability of an adaptive hypermedia system to create tailored environments depends mainly on the amount and accuracy of information stored in each user model. One of th...
Enrique Frías-Martínez, George D. Ma...