Sciweavers

634 search results - page 62 / 127
» Consistent price systems under model uncertainty
Sort
View
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
15 years 3 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel
OTM
2005
Springer
15 years 3 months ago
On the Controlled Evolution of Access Rules in Cooperative Information Systems
Abstract. For several reasons enterprises are frequently subject to organizational change. Respective adaptations may concern business processes, but also other components of an en...
Stefanie Rinderle, Manfred Reichert
DKE
2008
85views more  DKE 2008»
14 years 10 months ago
On automatic knowledge validation for Bayesian knowledge bases
Knowledge validation, as part of knowledge base verification and validation is a critical process in knowledge engineering. The ultimate goal of this process is to make the knowle...
Eugene Santos Jr., Hang T. Dinh
ICDCSW
2005
IEEE
15 years 3 months ago
QoS Oriented Dynamic Replica Cost Model for P2P Computing
Replication on multiple nodes is an effective way to improve the availability in the P2P or grid environment. It is difficult to determine how many replicas can fulfill the user r...
Feng Mao, Hai Jin, Deqing Zou, Baoli Chen, Li Qi
WWW
2008
ACM
15 years 10 months ago
Online auctions efficiency: a survey of ebay auctions
Online auctions have become a pervasive transaction mechanism for e-commerce. As the largest online marketplace in the world, eBay is an attractive case study that enables the stu...
Wenyan Hu, Alvaro Bolivar