Sciweavers

486 search results - page 97 / 98
» policy 2005
Sort
View
ECLIPSE
2005
ACM
13 years 10 months ago
Leveraging Eclipse for integrated model-based engineering of web service compositions
In this paper we detail the design and implementation of an Eclipse plug-in for an integrated, model-based approach, to the engineering of web service compositions. The plug-in al...
Howard Foster, Sebastián Uchitel, Jeff Mage...
AUTOMATICA
2006
104views more  AUTOMATICA 2006»
13 years 8 months ago
Identification of multi-input systems: variance analysis and input design issues
This paper examines the identification of multi-input systems. Motivated by an experiment design problem (should one excite the various inputs simultaneously or separately), we ex...
Michel Gevers, Ljubisa Miskovic, Dominique Bonvin,...
JOT
2008
445views more  JOT 2008»
13 years 8 months ago
From The Business Motivation Model (BMM) To Service Oriented Architecture (SOA)
The purpose of this article is to provide a brief insight about how to link your business vision, goals, strategies, tactics as well as business rules according to BMM, then bridg...
Birol Berkem
EOR
2007
85views more  EOR 2007»
13 years 8 months ago
Modeling and analysis of a supply-assembly-store chain
We consider a supply–assembly–store chain with produce-to-stock strategy, which comprises a set of component suppliers, a mixed-model assembly line with a constantly moving co...
Xiaobo Zhao, Deju Xu, Hanqin Zhang, Qi-Ming He
TISSEC
2010
237views more  TISSEC 2010»
13 years 3 months ago
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs
Several credential systems have been proposed in which users can authenticate to service providers anonymously. Since anonymity can give users the license to misbehave, some varia...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...