Sciweavers

2005 search results - page 257 / 401
» Business Process Knowledge Modelling: Method and Tool
Sort
View
117
Voted
SIGADA
2005
Springer
15 years 9 months ago
Temporal skeletons for verifying time
This paper presents an intermediate notation used in a framework for verification of real-time properties. The framework aims at overcoming the need for the framework user to hav...
Gustaf Naeser, Kristina Lundqvist, Lars Asplund
AIED
2007
Springer
15 years 10 months ago
How did the e-learning session go? The Student Inspector
Good teachers know their students, and exploit this knowledge to adapt or optimise their instruction. Traditional teachers know their students because they interact with them face-...
Oliver Scheuer, Claus Zinn
144
Voted
ICSE
2001
IEEE-ACM
15 years 8 months ago
Using Transformation Systems for Software Maintenance and Reengineering
Software maintenance costs dominate software engineering costs, partly because most such engineering is done manually. Program Transformation tools leverage an engineer-provided b...
Ira D. Baxter
153
Voted
ICEIS
2008
IEEE
15 years 10 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
171
Voted
BMCBI
2002
214views more  BMCBI 2002»
15 years 3 months ago
Automated modelling of signal transduction networks
Background: Intracellular signal transduction is achieved by networks of proteins and small molecules that transmit information from the cell surface to the nucleus, where they ul...
Martin Steffen, Allegra Petti, John Aach, Patrik D...