Sciweavers

631 search results - page 36 / 127
» Why Model
Sort
View
MOBIS
2008
13 years 11 months ago
Policy-Based Semantic Compliance Checking for Business Process Management
: Compliance management, risk analysis, and auditing are disciplines that are critical for large scale distributed enterprise systems. The way these complex systems are developed a...
Marwane El Kharbili, Sebastian Stein
OWLED
2008
13 years 11 months ago
Pellint - A Performance Lint Tool for Pellet
Predicting the performance of a tableau reasoner for an OWL ontology is generally hard. It is even harder for users who are not familiar with the details of tableau algorithms. In ...
Harris Lin, Evren Sirin
SERP
2010
13 years 7 months ago
Role Explosion: Acknowledging the Problem
- In large enterprises subject to constant employee turnover and challenging security policies, the administration of Role-based Access Control (RBAC) is a daunting task that is of...
Aaron Elliott, Scott Knight
WS
2005
ACM
14 years 3 months ago
Modeling epidemic spreading in mobile environments
The growing popularity of mobile networks makes them increasingly attractive to virus writers, and malicious code targeting mobile devices has already begun to appear. Unfortunate...
James W. Mickens, Brian D. Noble
IJSM
2007
85views more  IJSM 2007»
13 years 9 months ago
Constraint Modeling for Curves and Surfaces in CAGD: a Survey
Computer-Aided Geometric Design modelers are now based on powerful mathematical curve and surface models, but there is still a considerable need for efficient tools to handle, ana...
Vincent Cheutet, Marc Daniel, Stefanie Hahmann, Ra...