Sciweavers

688 search results - page 80 / 138
» Neural Business Control System
Sort
View
ICECCS
2007
IEEE
120views Hardware» more  ICECCS 2007»
14 years 3 months ago
Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository
Parts of the CICS transaction processing system were modelled formally in the 1980s in a collaborative project between IBM Hursley Park and Oxford University Computing Laboratory....
Leo Freitas, Konstantinos Mokos, Jim Woodcock
CCS
2000
ACM
14 years 3 months ago
XML document security based on provisional authorization
The extensible markup language (XML) is a promising standard for describing semi-structured information and contents on the Internet. When XML comes to be a widespread data encodi...
Michiharu Kudo, Satoshi Hada
ICDE
2006
IEEE
131views Database» more  ICDE 2006»
15 years 15 days ago
On the Controlled Evolution of Process Choreographies
Process?aware information systems have to be frequently adapted due to business process changes. One important challenge not adequately addressed so far concerns the evolution of ...
Stefanie Rinderle, Andreas Wombacher, Manfred Reic...

Publication
295views
12 years 9 months ago
The Age of Analog Networks.
A large class of systems of biological and technological relevance can be described as analog networks, that is, collections of dynamic devices interconnected by links of varying s...
Claudio Mattiussi, Daniel Marbach, Peter Dürr, Da...
OZCHI
2006
ACM
14 years 5 months ago
Beyond security: implications for the future of federated digital identity management systems
Federated identity management is often viewed by corporations as a solution to support secure online commerce by synthesising complex and fragmented user information into a single...
Christine Satchell, Graeme G. Shanks, Steve Howard...