Sciweavers

42 search results - page 7 / 9
» On-the-Fly Data Flow Analysis Based on Verification Technolo...
Sort
View
IEEEIAS
2009
IEEE
13 years 5 months ago
An Improved Scheme of Single Sign-on Protocol
In order to avoid security threats caused by password attack and replay attack in single sign-on protocal, the most methods on sovling these issues are making use of complicated te...
Yang Jian
CIKM
2006
Springer
13 years 11 months ago
Mining compressed commodity workflows from massive RFID data sets
Radio Frequency Identification (RFID) technology is fast becoming a prevalent tool in tracking commodities in supply chain management applications. The movement of commodities thr...
Hector Gonzalez, Jiawei Han, Xiaolei Li
WSC
2000
13 years 9 months ago
Automatic generation of simulation models from neutral libraries: an example
Researchers at the National Institute of Standards and Technology have proposed the development of neutral libraries of simulation components. The availability of such libraries w...
Young-Jun Son, Albert Jones, Richard A. Wysk
ISJ
2002
212views more  ISJ 2002»
13 years 7 months ago
Assessing and managing the benefits of enterprise systems: the business manager's perspective
This paper focuses on the benefits that organizations may achieve from their investment in enterprise systems (ES). It proposes an ES benefit framework for summarizing benefits in ...
Shari Shang, Peter B. Seddon
KDD
2003
ACM
205views Data Mining» more  KDD 2003»
14 years 8 months ago
The data mining approach to automated software testing
In today's industry, the design of software tests is mostly based on the testers' expertise, while test automation tools are limited to execution of pre-planned tests on...
Mark Last, Menahem Friedman, Abraham Kandel