Sciweavers

6167 search results - page 865 / 1234
» Can Refinement be Automated
Sort
View
CAISE
2009
Springer
15 years 9 months ago
Anomaly Detection Using Process Mining
Abstract. Recently, several large companies have been involved in financial scandals related to mismanagement, resulting in financial damages for their stockholders. In response, c...
Fábio de Lima Bezerra, Jacques Wainer, Wil ...
DIM
2007
ACM
15 years 9 months ago
Using reputation to augment explicit authorization
Online social networks are formed when web applications allow users to contribute to an online community. The explosive growth of these social networks taxes the management capaci...
Phillip J. Windley, Devlin Daley, Bryant Cutler, K...
EUROSYS
2007
ACM
15 years 9 months ago
Automatic configuration of internet services
Recent research has found that operators frequently misconfigure Internet services, causing various availability and performance problems. In this paper, we propose a software inf...
Wei Zheng, Ricardo Bianchini, Thu D. Nguyen
IAT
2009
IEEE
15 years 9 months ago
The Benefits of Opponent Models in Negotiation
Information about the opponent is essential to improve automated negotiation strategies for bilateral multiissue negotiation. In this paper we propose a negotiation strategy that e...
Koen V. Hindriks, Catholijn M. Jonker, Dmytro Tykh...
ASPDAC
2004
ACM
96views Hardware» more  ASPDAC 2004»
15 years 9 months ago
Rate analysis for streaming applications with on-chip buffer constraints
While mapping a streaming (such as multimedia or network packet processing) application onto a specified architecture, an important issue is to determine the input stream rates tha...
Alexander Maxiaguine, Simon Künzli, Samarjit ...