Sciweavers

305 search results - page 47 / 61
» Petri Net Analysis Using Decision Diagrams
Sort
View
LISA
2007
14 years 11 months ago
Assisted Firewall Policy Repair Using Examples and History
Firewall policies can be extremely complex and difficult to maintain, especially on networks with more than a few hundred machines. The difficulty of configuring a firewall proper...
Robert M. Marmorstein, Phil Kearns
IMC
2005
ACM
15 years 3 months ago
The Power of Slicing in Internet Flow Measurement
Flow measurement evolved into the primary method for measuring the composition of Internet traffic. Large ISPs and small networks use it to track dominant applications, dominant ...
Ramana Rao Kompella, Cristian Estan
BPM
2010
Springer
191views Business» more  BPM 2010»
14 years 10 months ago
Correctness Ensuring Process Configuration: An Approach Based on Partner Synthesis
Abstract. A configurable process model describes a family of similar process models in a given domain. Such a model can be configured to obtain a specific process model that is sub...
Wil M. P. van der Aalst, Niels Lohmann, Marcello L...
CAISE
2004
Springer
15 years 2 months ago
Ontologies for Analysis and Improvement of Business Process Quality in a Virtual Enterprise
The paper describes the representation and use of three ontologies in a software aiming at the assistance of a virtual team in business process analysis and improvement (BPI), usin...
Alexandra Galatescu, Taisia Greceanu
ICDE
2010
IEEE
192views Database» more  ICDE 2010»
15 years 4 months ago
XML reasoning made practical
— We present a tool for the static analysis of XPath queries and XML Schemas. The tool introduces techniques used in the field of verification (such as binary decision diagrams...
Pierre Genevès, Nabil Layaïda