Sciweavers

5544 search results - page 138 / 1109
» Three Inadequate Models
Sort
View
NOMS
2008
IEEE
14 years 3 months ago
Towards malware inspired management frameworks
Abstract—Scalability is a real challenge for network management due to the increase of the devices to be managed and their various locations. A potential solution is based on bot...
Jérôme François, Radu State, O...
ICSEA
2006
IEEE
14 years 3 months ago
Reflection: Improving Research through Knowledge Transfer
— It is through our mental models of the world that we understand it. Advances in science are nothing more than improvements to the model. This paper presents the development and...
Andre Oboler, Simon Lock, Ian Sommerville
ACISP
2004
Springer
14 years 2 months ago
Protocols with Security Proofs for Mobile Applications
The Canetti-Krawczyk (CK) model is useful for building reusable components that lead to rapid development of secure protocols, especially for engineers working outside of the secur...
Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Bo...
EURODAC
1994
IEEE
139views VHDL» more  EURODAC 1994»
14 years 1 months ago
OSCAR: optimum simultaneous scheduling, allocation and resource binding based on integer programming
: This paper presents an approach to high-level synthesis which is based upon a 0/1 integer programming model. In contrast to other approaches, this model allows solving all three ...
Birger Landwehr, Peter Marwedel, Rainer Dömer
BPM
2007
Springer
125views Business» more  BPM 2007»
14 years 3 months ago
What Makes Process Models Understandable?
Abstract. Despite that formal and informal quality aspects are of significant importance to business process modeling, there is only little empirical work reported on process mode...
Jan Mendling, Hajo A. Reijers, Jorge Cardoso