Sciweavers

915 search results - page 176 / 183
» Security in Business Process Engineering
Sort
View
ISW
2007
Springer
14 years 1 months ago
Detecting System Emulators
Malware analysis is the process of determining the behavior and purpose of a given malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step to be a...
Thomas Raffetseder, Christopher Krügel, Engin...
SC
2009
ACM
14 years 2 months ago
Kepler + Hadoop: a general architecture facilitating data-intensive applications in scientific workflow systems
MapReduce provides a parallel and scalable programming model for data-intensive business and scientific applications. MapReduce and its de facto open source project, called Hadoop...
Jianwu Wang, Daniel Crawl, Ilkay Altintas
ECMDAFA
2007
Springer
122views Hardware» more  ECMDAFA 2007»
14 years 1 months ago
Model Transformation from OWL-S to BPEL Via SiTra
Although there are a large number of academic and industrial model transformation frameworks available, allowing specification, implementation, maintenance and documentation of mod...
Behzad Bordbar, Gareth Howells, Michael Evans, Ath...
UPP
2004
Springer
14 years 26 days ago
Inverse Design of Cellular Automata by Genetic Algorithms: An Unconventional Programming Paradigm
Evolving solutions rather than computing them certainly represents an unconventional programming approach. The general methodology of evolutionary computation has already been know...
Thomas Bäck, Ron Breukelaar, Lars Willmes
DAC
1997
ACM
13 years 11 months ago
Electronic Component Information Exchange (ECIX)
A number of industry trends are shaping the requirements for IC and electronic equipment design. The density and complexity of circuit technologies have increased to a point where...
Donald R. Cottrell