Sciweavers

1817 search results - page 177 / 364
» Extensive Games as Process Models
Sort
View
107
Voted
ARESEC
2011
76views more  ARESEC 2011»
14 years 3 months ago
A Complexity Based Forensic Analysis of the Trojan Horse Defence
—The Operational Complexity Model (OCM) has been used to derive the complexities of the five most prevalent cyber-crimes occurring in southeast Asia, namely peer-to-peer (P2P) mu...
Richard E. Overill, Jantje A. M. Silomon
185
Voted
ISDO
2000
194views Business» more  ISDO 2000»
15 years 4 months ago
Contract-Based Transaction Management in Cross-Organizational Workflow Management
Cross-organizational workflow management is an essential ingredient for process integration in virtual enterprises. To obtain cross-organizational workflow processes with robust s...
Paul W. P. J. Grefen
EUROS
2008
153views Robotics» more  EUROS 2008»
15 years 5 months ago
Adaptive Multiple Resources Consumption Control for an Autonomous Rover
Resources consumption control is crucial in the autonomous rover context. Most of the time, the resources consumption is probabilistic. During execution time, the rover has to adap...
Simon Le Gloannec, Abdel-Illah Mouaddib, Fran&cced...
100
Voted
IDEAL
2007
Springer
15 years 9 months ago
Quality of Adaptation of Fusion ViSOM
This work presents a research on the performance capabilities of an extension of the ViSOM (Visualization Induced SOM) algorithm by the use of the ensemble meta-algorithm and a lat...
Bruno Baruque, Emilio Corchado, Hujun Yin
123
Voted
APSEC
2003
IEEE
15 years 8 months ago
Developing Secure Networked Web-Based Systems Using Model-based Risk Assessment and UMLsec
Despite a growing awareness of security issues in networked computing systems, most development processes used today still do not take security aspects into account. To address th...
Siv Hilde Houmb, Jan Jürjens