Sciweavers

2288 search results - page 164 / 458
» Learning Business Process Models: A Case Study
Sort
View
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 10 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
IIE
2006
130views more  IIE 2006»
15 years 4 months ago
A Study on the Perception of Students towards Educational Weblogs
Weblogs are a popular form of easy-to-use personal publishing that has attracted millions of bloggers to share their personal thoughts, opinions, and knowledge on the web. The vers...
Andrew K. Lui, Sheung-On Choy, Yannie H. Y. Cheung...
DAWAK
2008
Springer
15 years 6 months ago
UML-Based Modeling for What-If Analysis
In order to be able to evaluate beforehand the impact of a strategical or tactical move, decision makers need reliable previsional systems. What-if analysis satisfies this need by ...
Matteo Golfarelli, Stefano Rizzi
FORTE
2007
15 years 5 months ago
Specifying and Composing Interaction Protocols for Service-Oriented System Modelling
Abstract. We present and discuss a formal, high-level approach to the specification and composition of interaction protocols for service-oriented systems. This work is being develo...
João Abreu, Laura Bocchi, José Luiz ...
WISE
2008
Springer
15 years 10 months ago
Mobile Payment: Towards a Customer-Centric Model
Abstract. Mobile payment normally occurs as a wireless transaction of monetary value and includes the initiation, authorization and the realization of the payment. Such transaction...
Krassie Petrova