Sciweavers

15375 search results - page 337 / 3075
» cans 2008
Sort
View
FLAIRS
2008
15 years 6 months ago
Second-Order Risk Constraints
This paper discusses how numerically imprecise information can be modelled and how a risk evaluation process can be elaborated by integrating procedures for numerically imprecise ...
Love Ekenberg, Aron Larsson, Mats Danielson
USS
2008
15 years 6 months ago
Exploitable Redirects on the Web: Identification, Prevalence, and Defense
Web sites on the Internet often use redirection. Unfortunately, without additional security, many of the redirection links can be manipulated and abused to mask phishing attacks. ...
Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta
AMAST
2008
Springer
15 years 6 months ago
Petri Nets Are Dioids
In a seminal paper Montanari and Meseguer showed that an algebraic interpretation of Petri nets in terms of commutative monoids can be used to provide an elegant characterisation o...
Paolo Baldan, Fabio Gadducci
APN
2008
Springer
15 years 6 months ago
Compositional Specification of Web Services Via Behavioural Equivalence of Nets: A Case Study
Abstract. Web services represent a promising technology for the development of distributed heterogeneous software systems. In this setting, a major issue is to establish whether tw...
Filippo Bonchi, Antonio Brogi, Sara Corfini, Fabio...
BPM
2008
Springer
147views Business» more  BPM 2008»
15 years 6 months ago
Business Process Modelling with Continuous Validation
In this paper, we demonstrate the prototype of a modelling tool that applies graph-based rules for identifying problems in business process models. The advantages of our approach a...
Stefan Kühne, Heiko Kern, Volker Gruhn, Ralf ...