Sciweavers

1795 search results - page 64 / 359
» Security Models and Information Flow
Sort
View
ICEIS
2006
IEEE
14 years 3 months ago
Product Oriented Modelling and Interoperability Issues
The consideration of Product information or Knowledge management, product traceability or genealogy, and product life cycle management implies new strategies and approaches to mana...
Salah Baïna, Hervé Panetto, Khalid Ben...
CAISE
1999
Springer
14 years 1 months ago
Applying Graph Reduction Techniques for Identifying Structural Conflicts in Process Models
Abstract. The foundation of a process model lies in its control flow specifications. Using a generic process modeling language for workflows, we show how a control flow specificati...
Wasim Sadiq, Maria E. Orlowska
MASCOTS
2004
13 years 11 months ago
A Hysteresis Model for Web/TCP Transfer Latency
This paper presents an accurate stochastic model for transfer latency of short-lived Web-like TCP flows with random packet losses. Our model characterizes a data transfer in alter...
Yujian Li, Carey L. Williamson
HICSS
2002
IEEE
179views Biometrics» more  HICSS 2002»
14 years 2 months ago
Combined Modeling with Multi-agent Systems and Simulation: Its Application to Harbor Supply Chain Management
This paper presents a method for modeling the dynamic behavior of harbor supply chains and evaluating strategic and operational policies of the proposed harbor supply chain by app...
Dong Won Yi, Soung Hie Kim, Nak Hyun Kim
CASES
2004
ACM
14 years 3 months ago
Hardware assisted control flow obfuscation for embedded processors
+ With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transa...
Xiaotong Zhuang, Tao Zhang, Hsien-Hsin S. Lee, San...