Sciweavers

42 search results - page 7 / 9
» Artefacts and Roles: Modelling Strategies in a Multiplicativ...
Sort
View
CIMCA
2006
IEEE
14 years 2 days ago
A Knowledge-based Security Policy Framework for Business Process Management
Business Process Management (BPM) is often a key component of the business change. Business rules, whether embedded within BPM or on their own, have begun playing an ever-increasi...
Dong Huang, Yi Yang, Jacques Calmet
ACMICEC
2004
ACM
160views ECommerce» more  ACMICEC 2004»
13 years 11 months ago
A shared service terminology for online service provisioning
An extensive literature research in the fields of IT and business science reveals that service-related terms as service and e-service have multiple interpretations within busines...
Ziv Baida, Jaap Gordijn, Borys Omelayenko
LREC
2010
143views Education» more  LREC 2010»
13 years 7 months ago
Determining the Origin and Structure of Person Names
This paper presents a novel system HENNA (Hybrid Person Name Analyzer) for identifying language origin and analyzing linguistic structures of person names. We conduct ME-based cla...
Yu Fu, Feiyu Xu, Hans Uszkoreit
ACSW
2006
13 years 7 months ago
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS
Intrusion detection systems (IDS) perform an important role in the provision of network security, providing real- time notification of attacks in progress. One promising category ...
David Duncombe, George M. Mohay, Andrew Clark
SYNTHESE
2010
129views more  SYNTHESE 2010»
13 years 4 months ago
Belief and contextual acceptance
I develop a strategy for representing epistemic states and epistemic changes that seeks to be sensitive to the difference between voluntary and involuntary aspects of our epistemi...
Eleonora Cresto