Sciweavers

225 search results - page 43 / 45
» Taxonomy of Flexibility in Business Processes
Sort
View
GLOBECOM
2009
IEEE
13 years 9 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
CASCON
2008
137views Education» more  CASCON 2008»
13 years 6 months ago
Automating SLA modeling
Service Level Agreements (SLAs) define the level of service that a service provider must deliver. An SLA is a contract between service provider and consumer, and includes appropri...
Tony Chau, Vinod Muthusamy, Hans-Arno Jacobsen, El...
ECIS
2003
13 years 6 months ago
The value of cooperative planning in supply chains. A simulative approach
In this paper we examine, how the benefits of Supply Chain Management, as announced by the literature and widely accepted, can simulatively be proven. We first present selected re...
Luis Martín Díaz, Peter Buxmann
IJWET
2008
108views more  IJWET 2008»
13 years 5 months ago
Web service workflow selection using system and network QoS constraints
: Web services serve as a leading technology platform for web-based data-centric environments providing flexibility of loose coupling, message-based communication. Interest in more...
Yannis Panagis, Konstantinos Papakonstantinou, Eva...
JUCS
2010
213views more  JUCS 2010»
13 years 3 months ago
Mining Feature-Opinion in Online Customer Reviews for Opinion Summarization
: Online customer reviews is considered as a significant informative resource which is useful for both potential customers and product manufacturers. In web pages, the reviews are ...
Gamgarn Somprasertsri, Pattarachai Lalitrojwong