Sciweavers

9509 search results - page 165 / 1902
» Complex Event Processing
Sort
View
110
Voted
IMC
2005
ACM
15 years 8 months ago
Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event
Network “telescopes” that record packets sent to unused blocks of Internet address space have emerged as an important tool for observing Internet-scale events such as the spre...
Abhishek Kumar, Vern Paxson, Nicholas Weaver
JCIT
2008
165views more  JCIT 2008»
15 years 2 months ago
Mining Processes using cluster approach for representing workflows
Although much attention is being paid to business Intelligence during the past decades, the design for applying business Intelligence and particularly in a workflow processes is s...
N. P. Kavya, M. V. Sathyanarayana, N. C. Naveen
128
Voted
B
2007
Springer
15 years 6 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
ENTCS
2007
101views more  ENTCS 2007»
15 years 2 months ago
Systems Modelling via Resources and Processes: Philosophy, Calculus, Semantics, and Logic
We describe a programme of research in resource semantics, concurrency theory, bunched logic, and stochastic processes, as applied to mathematical systems modelling. Motivated by ...
David J. Pym, Chris M. N. Tofts
CIKM
1997
Springer
15 years 6 months ago
A Framework for the Management of Past Experiences with Time-Extended Situations
: In the context of knowledge management, we focus on the representation and the retrieval of past experiences called cases within the Case-Based Reasoning (CBR) paradigm. CBR is a...
Michel Jaczynski