Sciweavers

1538 search results - page 222 / 308
» Business Process Modeling Notation
Sort
View
93
Voted
SP
1987
IEEE
118views Security Privacy» more  SP 1987»
15 years 4 months ago
A Comparison of Commercial and Military Computer Security Policies
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to prov...
D. D. Clark, D. R. Wilson
WWW
2008
ACM
16 years 1 months ago
Context-sensitive QoS model: a rule-based approach to web service composition
Generally, web services are provided with different QoS values, so they can be selected dynamically in service composition process. However, the conventional context free composit...
Tao Zhou, Xiaolin Zheng, William Wei Song, Xiaofen...
104
Voted
HPDC
2010
IEEE
15 years 1 months ago
ParaText: scalable text modeling and analysis
Automated analysis of unstructured text documents (e.g., web pages, newswire articles, research publications, business reports) is a key capability for solving important problems ...
Daniel M. Dunlavy, Timothy M. Shead, Eric T. Stant...
175
Voted
OR
2011
Springer
14 years 7 months ago
Modeling an e-government observatory for rural SMEs using UML with RUP
Developing Web-based systems for agriculture and rural development requires the collaboration of experts from different scientific fields and backgrounds. Thus, it is crucial to ...
Sotiris Karetsos, Nikos Manouselis, Constantina Co...
120
Voted
APSEC
2005
IEEE
15 years 6 months ago
Model-Driven Semantic Web Service Composition
As the number of available Web services increases there is a growing demand to realise complex business processes by combining and reusing available Web services. The reuse and co...
Roy Grønmo, Michael C. Jaeger