Sciweavers

378 search results - page 59 / 76
» Security requirement analysis of business processes
Sort
View
SOCA
2008
IEEE
13 years 7 months ago
Log-based mining techniques applied to Web service composition reengineering
There is no doubt that SOA and BPM will continue to evolve dependently for the next ten years. Preparing common research infrastructures will require most important efforts of web ...
Walid Gaaloul, Karim Baïna, Claude Godart
PVLDB
2010
132views more  PVLDB 2010»
13 years 6 months ago
CoDA: Interactive Cluster Based Concept Discovery
Large data resources are ubiquitous in science and business. For these domains, an intuitive view on the data is essential to fully exploit the hidden knowledge. Often, these data...
Stephan Günnemann, Ines Färber, Hardy Kr...
AGENTS
2001
Springer
14 years 3 days ago
Matchmaking for autonomous agents in electronic marketplaces
Matchmaking is the process of mediating demand and supply based on profile information. Matchmaking plays a crucial role in agent-based electronic marketplaces: the problem to be ...
Daniel Veit, Jörg P. Müller, Martin Schn...
RIDE
2003
IEEE
14 years 26 days ago
ABHIDHA: An extended WordNet for Indo-Aryan Languages
– A lexical knowledge base is an important component of any intelligent information processing system. The WordNet developed at the Cognitive Systems Laboratories at Princeton ha...
Shireesh Reddy Annam, Monojit Choudhury, Sudeshna ...
ICRA
2000
IEEE
96views Robotics» more  ICRA 2000»
13 years 12 months ago
Design of Synchronized Supply Chains: A Six Sigma Tolerancing Approach
A supply chain network can be viewed as a network of facilities in which a customer order will flow through internal business processes such as procurement, production, and transp...
Y. Narahari, Nukala Viswanadham, R. Bhattacharya