Sciweavers

570 search results - page 65 / 114
» Using Patterns in the Design of Inter-organizational Systems...
Sort
View
VLDB
2007
ACM
150views Database» more  VLDB 2007»
14 years 2 months ago
Monitoring Business Processes with Queries
Many enterprises nowadays use business processes, based on the BPEL standard, to achieve their goals. These are complex, often distributed, processes. Monitoring the execution of ...
Catriel Beeri, Anat Eyal, Tova Milo, Alon Pilberg
MAGS
2008
114views more  MAGS 2008»
13 years 8 months ago
Automated formal analysis of human multi-issue negotiation processes
This paper reports on experiments in (human) multi-issue negotiation and their analysis, and presents a generic software environment supporting such an analysis. First, the paper p...
Tibor Bosse, Catholijn M. Jonker, Lourens van der ...
SPIN
2009
Springer
14 years 3 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
GISCIENCE
2010
Springer
192views GIS» more  GISCIENCE 2010»
13 years 9 months ago
Automatic Extraction of Destinations, Origins and Route Parts from Human Generated Route Directions
Researchers from the cognitive and spatial sciences are studying text descriptions of movement patterns in order to examine how humans communicate and understand spatial informatio...
Xiao Zhang, Prasenjit Mitra, Alexander Klippel, Al...
JODL
2000
201views more  JODL 2000»
13 years 8 months ago
A transaction log analysis of a digital library
As experimental digital library testbeds gain wider acceptance and develop significant user bases, it becomes important to investigate the ways in which users interact with the sy...
Steve Jones, Sally Jo Cunningham, Rodger J. McNab,...