Sciweavers

1580 search results - page 17 / 316
» CoTeSys - Cognition for Technical Systems
Sort
View
FC
2005
Springer
99views Cryptology» more  FC 2005»
15 years 5 months ago
Countering Identity Theft Through Digital Uniqueness, Location Cross-Checking, and Funneling
One of today’s fastest growing crimes is identity theft – the unauthorized use and exploitation of another individual’s identitycorroborating information. It is exacerbated b...
Paul C. van Oorschot, Stuart G. Stubblebine
ICCI
1993
15 years 3 months ago
Pattern Matching for Case Analysis: A Computational Definition of Closeness
We propose a conceptually and technically neat method to identify known semantic patterns close to a novel pattern. This occurs in the context of a system to acquire knowledge inc...
Sylvain Delisle, Terry Copeck, Stan Szpakowicz, Ke...
GI
2009
Springer
14 years 9 months ago
Frontloading: Virtual Quality Assurance for Improved Service Launch Processes
: Swift and frictionless launches of new products are a decisive capability of future telecommunication providers, especially in an all-IP production environment. These processes a...
Heiko Lehmann, Uwe Beyer, Simon Cohnitz, Udo Bub
APSEC
2000
IEEE
15 years 4 months ago
An adaptive distributed workflow system framework
Workflow management systems are increasingly used to assist the automation of business processes that involve the exchange of documents, information, or task execution results. Re...
Martin K. Purvis, Maryam Purvis, Selena Lemalu
IWC
2007
119views more  IWC 2007»
14 years 11 months ago
Dependable domestic systems design: A socio-technical approach
This paper describes a model that defines the attributes of domestic systems that lead to system dependability and a user-oriented specification method for support systems based...
Ian Sommerville, Guy Dewsbury