Sciweavers

87 search results - page 16 / 18
» On the Completion of Workflows
Sort
View
SOUPS
2006
ACM
14 years 2 months ago
Web wallet: preventing phishing attacks by revealing user intentions
We introduce a new anti-phishing solution, the Web Wallet. The Web Wallet is a browser sidebar which users can use to submit their sensitive information online. It detects phishin...
Min Wu, Robert C. Miller, Greg Little
DILS
2005
Springer
14 years 2 months ago
Setup and Annotation of Metabolomic Experiments by Integrating Biological and Mass Spectrometric Metadata
Unbiased metabolomic surveys are used for physiological, clinical and genomic studies to infer genotype-phenotype relationships. Long term reusability of metabolomic data needs bot...
Oliver Fiehn, Gert Wohlgemuth, Martin Scholz
EDOC
2003
IEEE
14 years 1 months ago
An Agent-based Architecture for Analyzing Business Processes of Real-Time Enterprises
As the desire for business intelligence capabilities for e-business processes expands, existing workflow management systems and decision support systems are not able to provide co...
Jun-Jang Jeng, Josef Schiefer, Henry Chang
ECBS
2000
IEEE
155views Hardware» more  ECBS 2000»
14 years 1 months ago
A Component-Driven Architecture for Internet-Based, Directly Reactive Information Systems
In this paper we focus on the architecture-based development of what we call directly reactive information systems on the Internet. These systems exhibit full content management o...
René Stolle, Wilhelm Rossak, Vassilka Kirov...
JWSR
2008
145views more  JWSR 2008»
13 years 8 months ago
An Access-Control Framework for WS-BPEL
Business processes, the next-generation workflows, have attracted considerable research interest in the last 15 years. More recently, several XML-based languages have been propose...
Federica Paci, Elisa Bertino, Jason Crampton