Sciweavers

2421 search results - page 99 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
78
Voted
BPM
2003
Springer
116views Business» more  BPM 2003»
15 years 6 months ago
Use Cases as Workflows
Abstract. In requirements engineering we have to discover the user requirements and then we have to transform them into precise system specifications. There are two essential aspec...
Michel R. V. Chaudron, Kees M. van Hee, Lou J. Som...
ISN
1997
Springer
15 years 4 months ago
Inter-Domain Integration of Services and Service Management
The evolution of the global telecommunications industry into an open services market presents developers of telecommunication service and management systems with many new challeng...
David Lewis, Thanassis Tiropanis, Cliff Redmond, V...
MMNS
1997
121views Multimedia» more  MMNS 1997»
15 years 2 months ago
Experiences in integrated multi-domain service management
Increased competition, complex service provision chains and integrated service offerings require effective techniques for the rapid integration of telecommunications services and ...
David Lewis, Thanassis Tiropanis, Alistair McEwan,...
IAAI
2001
15 years 2 months ago
Image-Feature Extraction for Protein Crystallization: Integrating Image Analysis and Case-Based Reasoning
This paper describes issues related to integrating image analysis techniques into case-based reasoning. Although the approach is generic, a high-throughput protein crystallization...
Igor Jurisica, Phil Rogers, Janice I. Glasgow, Suz...
ADMI
2010
Springer
15 years 2 months ago
Clustering in a Multi-Agent Data Mining Environment
A Multi-Agent based approach to clustering using a generic Multi-Agent Data Mining (MADM) framework is described. The process use a collection of agents, running several different ...
Santhana Chaimontree, Katie Atkinson, Frans Coenen