Sciweavers

378 search results - page 63 / 76
» Security requirement analysis of business processes
Sort
View
AMINING
2003
Springer
293views Data Mining» more  AMINING 2003»
14 years 24 days ago
Data Mining Oriented CRM Systems Based on MUSASHI: C-MUSASHI
Abstract. MUSASHI is a set of commands which enables us to efficiently execute various types of data manipulations in a flexible manner, mainly aiming at data processing of huge a...
Katsutoshi Yada, Yukinobu Hamuro, Naoki Katoh, Tak...
WECWIS
2005
IEEE
142views ECommerce» more  WECWIS 2005»
14 years 1 months ago
Implementing Web Service Protocols in SOA: WS-Coordination and WS-BusinessActivity
Web Service protocol standards should be unambiguous and provide a complete description of the allowed behavior of the protocols’ participants. Implementation of such protocols ...
Friedrich H. Vogt, Simon Zambrovski, Boris Gruschk...
ADAEUROPE
2010
Springer
13 years 5 months ago
Scheduling Configuration of Real-Time Component-Based Applications
Abstract: This paper proposes a strategy to manage the schedulability of realtime component-based applications that is fully compatible with the concept of component viewed as a re...
Patricia López Martínez, Laura Barro...
MDM
2010
Springer
188views Communications» more  MDM 2010»
13 years 6 months ago
A Distributed Technique for Dynamic Operator Placement in Wireless Sensor Networks
—We present an optimal distributed algorithm to adapt the placement of a single operator in high communication cost networks, such as a wireless sensor network. Our parameterfree...
Georgios Chatzimilioudis, Nikos Mamoulis, Dimitrio...
IV
2009
IEEE
124views Visualization» more  IV 2009»
14 years 2 months ago
Needs Assessment for the Design of Information Synthesis Visual Analytics Tools
Information synthesis is a key portion of the analysis process with visual analytics tools. This stage of work requires users to collect, organize, and add meaning to individual a...
Anthony C. Robinson