Sciweavers

915 search results - page 75 / 183
» Security in Business Process Engineering
Sort
View
DAC
2008
ACM
14 years 11 months ago
Bounded-lifetime integrated circuits
Integrated circuits with bounded lifetimes can have many business advantages. We give some simple examples of m ods to enforce tunable expiration dates for chips using nanom reliab...
Puneet Gupta, Andrew B. Kahng
INFOCOM
2008
IEEE
14 years 4 months ago
Snoogle: A Search Engine for the Physical World
—Hardware advances will allow us to embed small devices into everyday objects such as toasters and coffee mugs, thus naturally form a wireless object network that connects the ob...
Haodong Wang, Chiu Chiang Tan, Qun Li
BPM
2008
Springer
131views Business» more  BPM 2008»
14 years 2 days ago
Enhancing Web Service Composition by Means of Diagnosis
Abstract. This paper proposes a framework based on Service Oriented Architecture which integrates diagnostic services in the architecture of a composite service in order to improve...
Liliana Ardissono, Stefano Bocconi, Luca Console, ...
ICSE
2004
IEEE-ACM
14 years 10 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde
ICFEM
2005
Springer
14 years 3 months ago
A Compositional Framework for Service Interaction Patterns and Interaction Flows
We provide precise high-level models for eight fundamental service interaction patterns, together with schemes for their composition into complex service-based business process int...
Alistair P. Barros, Egon Börger