Sciweavers

545 search results - page 88 / 109
» expert 2008
Sort
View
EMS
2008
IEEE
13 years 9 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
ER
2008
Springer
179views Database» more  ER 2008»
13 years 9 months ago
Recommendation Based Process Modeling Support: Method and User Experience
Abstract Although most workflow management systems nowadays offer graphical editors for process modeling, the learning curve is still too steep for users who are unexperienced in p...
Thomas Hornung, Agnes Koschmider, Georg Lausen
EWCBR
2008
Springer
13 years 9 months ago
Evaluation Measures for TCBR Systems
Textual-case based reasoning (TCBR) systems where the problem and solution are in free text form are hard to evaluate. In the absence of class information, domain experts are neede...
M. A. Raghunandan, Nirmalie Wiratunga, Sutanu Chak...
FPLAY
2008
13 years 9 months ago
Intelligent adaptation of digital game-based learning
Games for learning cannot take the same design approach as games when targeting audiences. While players of entertainment games have the luxury of choosing games that suit them, s...
Brian Magerko, Carrie Heeter, Joe Fitzgerald, Ben ...
ICWS
2008
IEEE
13 years 9 months ago
A Temporal Data-Mining Approach for Discovering End-to-End Transaction Flows
Effective management of Web Services systems relies on accurate understanding of end-to-end transaction flows, which may change over time as the service composition evolves. This ...
Ting Wang, Chang-Shing Perng, Tao Tao, Chunqiang T...