Sciweavers

1700 search results - page 249 / 340
» Introducing Business Process into Legacy Information Systems
Sort
View
CSFW
2000
IEEE
15 years 2 months ago
Secure Composition of Untrusted Code: Wrappers and Causality Types
We consider the problem of assembling concurrent software systems from untrusted or partially trusted o -the-shelf components, using wrapper programs to encapsulate components and...
Peter Sewell, Jan Vitek
KES
2008
Springer
14 years 9 months ago
The User Centred Knowledge Model - t-UCK
In knowledge engineering, modelling knowledge is the process of structuring knowledge before implementation. A crucial part of system development depends on the acquiring and struc...
Anne Håkansson
EKAW
2004
Springer
15 years 3 months ago
Refactoring Methods for Knowledge Bases
The manual development of large knowledge systems is a difficult and error-prone task. In order to facilitate extensions to an existing knowledge base the structural design of the...
Joachim Baumeister, Frank Puppe, Dietmar Seipel
CDC
2010
IEEE
114views Control Systems» more  CDC 2010»
14 years 4 months ago
On subspace identification of cascade structured systems
Subspace identification has proven useful when identifying identifying multi-input multi-output systems. It is, however, important in many applications to take a priori structural ...
Per Hagg, Bo Wahlberg, Henrik Sandberg
EDBT
2008
ACM
206views Database» more  EDBT 2008»
15 years 10 months ago
Designing an inductive data stream management system: the stream mill experience
There has been much recent interest in on-line data mining. Existing mining algorithms designed for stored data are either not applicable or not effective on data streams, where r...
Hetal Thakkar, Barzan Mozafari, Carlo Zaniolo