Sciweavers

2421 search results - page 387 / 485
» Consistency Management for Complex Applications
Sort
View
IUI
2004
ACM
15 years 9 months ago
Supporting user hypotheses in problem diagnosis
People are performing increasingly complicated actions on the web, such as automated purchases involving multiple sites. Things often go wrong, however, and it can be difficult to...
Earl J. Wagner, Henry Lieberman
140
Voted
APN
2004
Springer
15 years 9 months ago
EMiT: A Process Mining Tool
Process mining offers a way to distill process models from event logs originating from transactional systems in logistics, banking, e-business, health-care, etc. The algorithms us...
Boudewijn F. van Dongen, Wil M. P. van der Aalst
DALT
2004
Springer
15 years 9 months ago
A Protocol for Resource Sharing in Norm-Governed Ad Hoc Networks
Ad hoc networks may be viewed as computational systems whose members may fail to, or choose not to, comply with the rules governing their behaviour. We are investigating to what ex...
Alexander Artikis, Lloyd Kamara, Jeremy Pitt, Mare...
ISAS
2004
Springer
15 years 9 months ago
A Modular Approach for Model-Based Dependability Evaluation of a Class of Systems
Analytical and simulative modeling for dependability and performance evaluation has been proven to be a useful and versatile approach in all the phases of the system life cycle. I...
Stefano Porcarelli, Felicita Di Giandomenico, Paol...
ISI
2004
Springer
15 years 9 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho