Sciweavers

42 search results - page 7 / 9
» Artefacts and Roles: Modelling Strategies in a Multiplicativ...
Sort
View
CIMCA
2006
IEEE
15 years 3 months ago
A Knowledge-based Security Policy Framework for Business Process Management
Business Process Management (BPM) is often a key component of the business change. Business rules, whether embedded within BPM or on their own, have begun playing an ever-increasi...
Dong Huang, Yi Yang, Jacques Calmet
ACMICEC
2004
ACM
160views ECommerce» more  ACMICEC 2004»
15 years 3 months ago
A shared service terminology for online service provisioning
An extensive literature research in the fields of IT and business science reveals that service-related terms as service and e-service have multiple interpretations within busines...
Ziv Baida, Jaap Gordijn, Borys Omelayenko
LREC
2010
143views Education» more  LREC 2010»
14 years 11 months ago
Determining the Origin and Structure of Person Names
This paper presents a novel system HENNA (Hybrid Person Name Analyzer) for identifying language origin and analyzing linguistic structures of person names. We conduct ME-based cla...
Yu Fu, Feiyu Xu, Hans Uszkoreit
ACSW
2006
14 years 11 months ago
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS
Intrusion detection systems (IDS) perform an important role in the provision of network security, providing real- time notification of attacks in progress. One promising category ...
David Duncombe, George M. Mohay, Andrew Clark
SYNTHESE
2010
129views more  SYNTHESE 2010»
14 years 8 months ago
Belief and contextual acceptance
I develop a strategy for representing epistemic states and epistemic changes that seeks to be sensitive to the difference between voluntary and involuntary aspects of our epistemi...
Eleonora Cresto