Sciweavers

428 search results - page 81 / 86
» A Rule Based Approach to the Service Composition Life-Cycle
Sort
View
IEEEIAS
2009
IEEE
15 years 4 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
VLDB
1999
ACM
147views Database» more  VLDB 1999»
15 years 1 months ago
Data-Driven, One-To-One Web Site Generation for Data-Intensive Applications
A data-driven approach can be fruitfully used in the speci cation and automatic generation of data-intensive Web applications, i.e., applications which make large amounts of data ...
Stefano Ceri, Piero Fraternali, Stefano Paraboschi
OTM
2007
Springer
15 years 3 months ago
An Outlook on Semantic Business Process Mining and Monitoring
Semantic Business Process Management (SBPM) has been proposed as an extension of BPM with Semantic Web and Semantic Web Services (SWS) technologies in order to increase and enhance...
Ana Karla Alves de Medeiros, Carlos Pedrinaci, Wil...
EDBTW
2010
Springer
15 years 2 months ago
Declarative scheduling in highly scalable systems
In modern architectures based on Web Services or Cloud Computing, a very large number of user requests arrive concurrently and has to be scheduled for execution constrained by cor...
Christian Tilgner
DEBS
2007
ACM
15 years 1 months ago
Concepts and models for typing events for event-based systems
Event-based systems are increasingly gaining widespread attention for applications that require integration with loosely coupled and distributed systems for time-critical business...
Szabolcs Rozsnyai, Josef Schiefer, Alexander Schat...